black-hat
Here are 22 public repositories matching this topic...
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
-
Updated
Nov 10, 2024 - Python
Automated attack surface mapper and vulnerability scanner (Work In Progress 🚧)
-
Updated
Oct 16, 2021 - Rust
A hands-on book for abusing systems using Rust (WIP) - Open Research
-
Updated
May 6, 2024 - Jupyter Notebook
Web Exploit here ! advanced web hacking and hacker toolkit in your hands
-
Updated
Aug 17, 2024 - Python
USA based Information Security & I.T. Conferences
-
Updated
Aug 5, 2022
A professional anti-phishing research tool 🔐 that serves scammers a tasty dish of millions of seeds 🍽️ while you sit back and watch the chaos 💥 . Generate payloads automatically ⚡ and log every move 📊 while testing your defenses 🛡️. Time to own those phishers and make them cry 🦸♂️💀!
-
Updated
Jul 7, 2025 - TypeScript
PoC code and tools for Black Hat EU 2020
-
Updated
Dec 9, 2020 - Python
A comprehensive collection of free cybersecurity eBooks categorized by topics and updated regularly
-
Updated
May 5, 2025
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate issues of dependency resolution involving deprecated modules.
-
Updated
May 19, 2020 - Python
Hacking with Python and Kali Linux
-
Updated
Nov 7, 2023 - Python
SQL Detector Tool In Perl
-
Updated
Jan 10, 2023 - Perl
Source code for building PoC binaries (Black Hat EU 2020)
-
Updated
Dec 7, 2020 - C
A keylogging utility for linux/UNIX and windows
-
Updated
Aug 16, 2022 - Rust
A Simple Port Scanner Wriiten In Go
-
Updated
Jan 26, 2023 - Go
All the code from the book "Black Hat Python" by Justin Seitz and Tim Arnold.
-
Updated
Jul 4, 2023 - Python
A comprehensive guide to ethical hacking and advanced OPSEC techniques. This repository provides a playbook for cybersecurity enthusiasts and professionals, covering topics like anonymity, vulnerability scanning, and exploitation, all while emphasizing ethical boundaries and safe practices in the realm of ethical hacking.
-
Updated
Oct 14, 2025
Random custom scripts for penetration testing purposes
-
Updated
Oct 12, 2025 - Python
Improve this page
Add a description, image, and links to the black-hat topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the black-hat topic, visit your repo's landing page and select "manage topics."