{"id":25024157,"url":"https://github.com/aw-junaid/black-hat-python","last_synced_at":"2025-04-30T08:42:26.065Z","repository":{"id":275737195,"uuid":"927028522","full_name":"aw-junaid/Black-Hat-Python","owner":"aw-junaid","description":"A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.","archived":false,"fork":false,"pushed_at":"2025-02-27T14:37:15.000Z","size":1310,"stargazers_count":12,"open_issues_count":0,"forks_count":3,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-02-27T20:38:54.342Z","etag":null,"topics":["blackhat","blackhat-python","hacker","hacking-tool","kali-linux","penetration-testing","python","redhat"],"latest_commit_sha":null,"homepage":"https://awjunaid.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/aw-junaid.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":null,"patreon":"awjunaid","open_collective":null,"ko_fi":null,"tidelift":null,"community_bridge":null,"liberapay":"awjunaid","issuehunt":null,"lfx_crowdfunding":null,"polar":null,"buy_me_a_coffee":"awjunaid","thanks_dev":null,"custom":null}},"created_at":"2025-02-04T09:31:36.000Z","updated_at":"2025-02-27T14:37:18.000Z","dependencies_parsed_at":null,"dependency_job_id":"006aff8c-8664-4411-bf74-edcf3dcab127","html_url":"https://github.com/aw-junaid/Black-Hat-Python","commit_stats":null,"previous_names":["aw-junaid/black-hat-python"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aw-junaid%2FBlack-Hat-Python","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aw-junaid%2FBlack-Hat-Python/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aw-junaid%2FBlack-Hat-Python/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aw-junaid%2FBlack-Hat-Python/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/aw-junaid","download_url":"https://codeload.github.com/aw-junaid/Black-Hat-Python/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246328374,"owners_count":20759757,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["blackhat","blackhat-python","hacker","hacking-tool","kali-linux","penetration-testing","python","redhat"],"created_at":"2025-02-05T15:52:27.823Z","updated_at":"2025-03-30T14:24:09.044Z","avatar_url":"https://github.com/aw-junaid.png","language":"Python","funding_links":["https://patreon.com/awjunaid","https://liberapay.com/awjunaid","https://buymeacoffee.com/awjunaid"],"categories":[],"sub_categories":[],"readme":"# Black-Hat-Python\n\u003cimg align = \"\" src=\"https://github.com/aw-junaid/aw-junaid/blob/main/Assets/asset1.webp\" width=\"1000\" height=\"250\" alt=\"awjunaid\"\u003e\n \n![GitHub contributors](https://img.shields.io/github/contributors/aw-junaid/Black-Hat-Python)\n![GitHub followers](https://img.shields.io/github/followers/aw-junaid)\n![YouTube Channel Subscribers](https://img.shields.io/youtube/channel/subscribers/UClhKVCHjOxBTNM50lOBTgoA)\n![Discord](https://img.shields.io/discord/1163365511309049948)\n![X (formerly Twitter) Follow](https://img.shields.io/twitter/follow/awjunaid_)\n![GitHub commit activity](https://img.shields.io/github/commit-activity/t/aw-junaid/Black-Hat-Python)\n![Website](https://img.shields.io/website?url=https%3A%2F%2Fawjunaid.com%2F)\n![GitHub repo size](https://img.shields.io/github/repo-size/aw-junaid/Black-Hat-Python)\n\n# Contact With Me:\n\n\n  \u003ca href=\"https://www.youtube.com/@awjunaid/featured\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=Youtube\u0026logo=youtube\u0026label=\u0026color=FF0000\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"youtube logo\"  /\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://www.instagram.com/awjunaid_\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=Instagram\u0026logo=instagram\u0026label=\u0026color=E4405F\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"instagram logo\"  /\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://www.twitch.tv/awjunaid\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=Twitch\u0026logo=twitch\u0026label=\u0026color=9146FF\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"twitch logo\"  /\u003e\n  \u003c/a\u003e\n  \u003ca href=\"mailto:abdulwahabjunaid07@gmail.com\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=Gmail\u0026logo=gmail\u0026label=\u0026color=D14836\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"gmail logo\"  /\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://www.linkedin.com/in/aw-junaid\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=LinkedIn\u0026logo=linkedin\u0026label=\u0026color=0077B5\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"linkedin logo\"  /\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://twitter.com/awjunaid_\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=Twitter\u0026logo=twitter\u0026label=\u0026color=1DA1F2\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"twitter logo\"  /\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://discord.gg/Neddn8gPqY\" target=\"_blank\"\u003e\n    \u003cimg src=\"https://img.shields.io/static/v1?message=Discord\u0026logo=discord\u0026label=\u0026color=7289DA\u0026logoColor=white\u0026labelColor=\u0026style=for-the-badge\" height=\"27\" alt=\"discord logo\"  /\u003e\n  \u003c/a\u003e\n\n\n\n  # 💰 You can help me by Donating\n  [![BuyMeACoffee](https://img.shields.io/badge/Buy%20Me%20a%20Coffee-ffdd00?style=for-the-badge\u0026logo=buy-me-a-coffee\u0026logoColor=black)](https://buymeacoffee.com/awjunaid) \n\n\u003e [!Note]\nThis repository contains tools and scripts sourced from various GitHub repositories and other open-source platforms. All original works are credited to their respective authors. If you are the owner of any content and wish to have it removed, please contact the repository author directly. This project is intended for educational and ethical purposes only. Unauthorized use, distribution, or modification of these tools without proper consent is prohibited. By using this repository, you agree to comply with all applicable laws and ethical guidelines. The author is not responsible for any misuse or damage caused by the tools provided herein.\n\n# Source\n\n- [blackhat-python3](https://github.com/EONRaider/blackhat-python3)\n- [Mastering Python Scripting for System Administrators](https://github.com/PacktPublishing/Mastering-Python-Scripting-for-System-Administrators-)\n- [python-pentest-tools](https://github.com/dloss/python-pentest-tools/blob/master/README.md)\n\n\n# Table of Content\n\n### Python Networking\n\n- [TCP Client](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/TCP%20Client.md)\n- [UDP Client](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/UDP%20Client.md)\n- [TCP Server](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/TCP%20Server.md)\n- [Netcat Client \u0026 Server for Remote code execution](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Netcat%20Client%20%26%20Server.md)\n- [TCP Proxy](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/TCP%20Proxy.md)\n- [SSH with Paramiko](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/SSH%20with%20Paramiko.py)\n- [Basic SSH server using the paramiko](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Basic%20SSH%20server%20using%20the%20paramiko.md)\n- [SSH reverse tunneling](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/SSH%20reverse%20tunneling.md)\n- [Simple SSH server](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/bhp_reverse_ssh_cmd.md)\n- [Packet Sniffer Using raw sockets](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/packet%20sniffer%20using%20raw%20sockets.md)\n- [Packet Sniffer Decoding Header](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Packet%20Sniffer%20Decoding%20Header.md)\n- [Packet Sniffer Decoding ICMP](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Packet%20Sniffer%20Decoding%20ICMP.md)\n- [Python Subnet Scanner with ICMP Packet Analysis](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Python%20Subnet%20Scanner%20with%20ICMP%20Packet%20Analysis.md)\n- [Email Credential Sniffer in Python](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Email%20Credential%20Sniffer%20in%20Python.md)\n- [ARP Cache Poisoning with Scapy](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/ARP%20Cache%20Poisoning%20with%20Scapy.md)\n- [PCAP Image Extractor \u0026 Face Detector](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/PCAP%20Image%20Extractor%20%26%20Face%20Detector.md)\n- [Brute-force HTTP authentication scan](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/HTTP/brute-force%20HTTP%20authentication%20scan.md)\n- [Check Open and Closed Ports on a Remote Host](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/HTTP/Check%20Open%20and%20Closed%20Ports%20on%20a%20Remote%20Host.md)\n- [Multithreaded TCP Port Scanning](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/HTTP/Multithreaded%20TCP%20Port%20Scanning.md)\n- [Scanning a Range of Ports on a Remote Host](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/HTTP/Scanning%20a%20Range%20of%20Ports%20on%20a%20Remote%20Host.md)\n- [Test a Socket Connection to a Remote Host](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/HTTP/Test%20a%20Socket%20Connection%20to%20a%20Remote%20Host.md)\n- [Resolve Host Name from an IP Address](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/HTTP/Resolve%20Host%20Name%20from%20an%20IP%20Address.md)\n### Web Hacking\n- [Web Path Scanner (Joomla Site Crawler)](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Web%20Path%20Scanner%20(Joomla%20Site%20Crawler).md)\n- [Directory \u0026 File Bruteforcer](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Directory%20%26%20File%20Bruteforcer.md)\n- [Multi-threaded Brute-Force Login Script](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/Multi-threaded%20Brute-Force%20Login%20Script.md)\n- [multi-threaded brute-force attack on a WordPress login page](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Networking/multi-threaded%20brute-force%20attack%20on%20a%20WordPress%20login%20page.md)\n\n### Burp Fuzzing\n- [Burp Suite Intruder Payload Generator (Python Extension)](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/BHP%20Fuzzer/Burp%20Suite%20Intruder%20Payload%20Generator%20(Python%20Extension).md)\n- [Burp Suite Extension: BHP Wordlist (Bing Search Integration)](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/BHP%20Fuzzer/Burp%20Suite%20Extension%3A%20BHP%20Wordlist%20(Bing%20Search%20Integration).md)\n- [Burp Suite Extension: BHP Wordlist Generator](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/BHP%20Fuzzer/Burp%20Suite%20Extension%3A%20BHP%20Wordlist%20Generator.md)\n\n### Github Command and Control\n- [GitHub-based trojan](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Github%20Command%20and%20Control/GitHub-based%20trojan.md)\n\n\n### Trojaning Tasks on Windows\n- [keylogger](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/keylogger.md)\n- [Captures a screenshot of the entire desktop on a Windows system](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/captures%20a%20screenshot%20of%20the%20entire%20desktop%20on%20a%20Windows%20system.md)\n- [Execute shellcode from a web server](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/execute%20shellcode%20from%20a%20web%20server.md)\n- [Sandbox Detection](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/Sandbox%20Detection.md)\n- [Monitor processes on a Windows system](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/Monitor%20processes%20on%20a%20Windows%20system.md)\n- [Monitor specific directories](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/monitor%20specific%20directories.md)\n- [Code Injection](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Trojaning%20Tasks%20on%20Windows/Code%20Injection.md)\n\n### Browser Attacks\n- [Browser Hijacking and Login Redirect](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Browser%20Attacks/Browser%20Hijacking%20and%20Login%20Redirect.md)\n- [Simple HTTP Server for Capturing Credentials](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Browser%20Attacks/Simple%20HTTP%20Server%20for%20Capturing%20Credentials.md)\n- [Document Exfiltration Using Tumblr](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Browser%20Attacks/Document%20Exfiltration%20Using%20Tumblr.md)\n- [Generates a new RSA key pair with a 2048-bit key length](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Browser%20Attacks/generates%20a%20new%20RSA%20key%20pair%20with%20a%202048-bit%20key%20length.md)\n- [Decrypts and decompresses the encrypted data](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Browser%20Attacks/decrypts%20and%20decompresses%20the%20encrypted%20data.md)\n  \n### Forensics\n- [Extract password hashes from a Windows memory dump using Volatility 3](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Forensics/extract%20password%20hashes%20from%20a%20Windows%20memory%20dump%20using%20Volatility%203.md)\n- [Redirect execution to the injected shellcode](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Forensics/redirect%20execution%20to%20the%20injected%20shellcode.md)\n- [Immunity Debugger](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Forensics/Immunity%20Debugger.md)\n\n### Automating Administrative Task\n\n- [Accept input from a file.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/accept_by_input_file.md)\n- [Accept input from a pipe.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/accept_by_pipe.md)\n- [Capture and process command output.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/capture_output.md)\n- [Execute external system commands.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/execute_external_commands.md)\n- [Generate and handle warning messages.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/generate_warnings.md)\n- [Example of using `getpass` for secure password input.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/getpass_example.md)\n- [Handle password input securely.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/handling_password.md)\n- [List directory contents.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/list_dir.md)\n- [Example of using Python's logging module.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/logging_example.md)\n- [Log warnings and error codes.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/logging_warnings_codes.md)\n- [Run scripts without user prompts.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/no_prompt.md)\n- [Open a web page or URL.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/open_web.md)\n- [Example of using `os` module for directory operations.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/os_dir_example.md)\n- [Reprompt for password input.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/password_prompt_again.md)\n- [Set CPU usage limits for processes.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/put_cpu_limit.md)\n- [Read and parse configuration files.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/read_config_file.md)\n- [Read and process multiple configuration files.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/read_many_config_file.md)\n- [Redirect input/output streams.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/Redirect%20input-output%20streams.md)\n- [Create backups of files or directories.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/Create%20backups%20of%20files%20or%20directories.md)\n- [Run scripts with user prompts.](https://github.com/aw-junaid/Black-Hat-Python/blob/main/Python%20Tools/Automating%20Regular%20Administrative%20Activities/Run%20scripts%20with%20user%20prompts.md)\n\n\n### Books\n\n-   [Violent Python](https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)\n-   [Grey Hat Python](http://www.nostarch.com/ghpython.htm)\n-   [Black Hat Python](http://www.nostarch.com/blackhatpython)\n-   [Python Penetration Testing Essentials](https://github.com/PacktPublishing/Python-Penetration-Testing-Essentials-Second-Edition)\n-   [Python for Secret Agents](https://www.packtpub.com/en-us/product/python-for-secret-agents-volume-ii-9781785283406)\n-   [Python Web Penetration Testing Cookbook](https://www.packtpub.com/en-us/product/python-web-penetration-testing-cookbook-9781784399900) \n-   [Learning Penetration Testing with Python](https://www.packtpub.com/en-us/product/learning-penetration-testing-with-python-9781785289552)\n-   [Python Forensics](http://www.sciencedirect.com/science/book/9780124186767)\n-   [The Beginner's Guide to IDAPython](https://leanpub.com/IDAPython-Book)\n-   [Python for Offensive PenTest: A Practical Guide to Ethical Hacking and Penetration Testing Using Python](https://www.amazon.com/Python-Offensive-PenTest-practical-penetration/dp/1788838971)\n\n## Python Tools for Penetration Testing\n\n\n### Network\n\n-   [Scapy](https://scapy.net): send, sniff and dissect\n    and forge network packets. Usable interactively or as a library\n-   [Impacket](http://oss.coresecurity.com/projects/impacket.html):\n    craft and decode network packets. Includes support for higher-level\n    protocols such as NMB and SMB\n-   [SMBMap](https://github.com/ShawnDEvans/smbmap): \n    enumerate Samba share drives across an entire domain\n-   [dpkt](https://github.com/kbandla/dpkt): fast, simple packet\n    creation/parsing, with definitions for the basic TCP/IP protocols\n-   [AutoRecon](https://github.com/Tib3rius/AutoRecon): Multi-threaded network reconnaissance tool\n-   [Mitm6](https://github.com/fox-it/mitm6): IPv6-based MITM tool that exploits IPv6 features to conduct man-in-the-middle attacks\n-   [Habu](https://github.com/portantier/habu): \n    python network hacking toolkit\n-   [Knock Subdomain Scan](https://github.com/guelfoweb/knock), enumerate\n    subdomains on a target domain through a wordlist\n-   [SubBrute](https://github.com/TheRook/subbrute), fast subdomain\n    enumeration tool\n-   [pypcap](https://github.com/dugsong/pypcap),\n    [Pcapy](https://github.com/helpsystems/pcapy),\n    [Pcapy-NG](https://github.com/stamparm/pcapy-ng) and\n    [libpcap](https://pypi.org/project/libpcap/): several different\n    Python bindings for libpcap\n-   [libdnet](https://github.com/ofalk/libdnet/): low-level networking\n    routines, including interface lookup and Ethernet frame transmission\n-   [Mallory](https://github.com/intrepidusgroup/mallory), extensible\n    TCP/UDP man-in-the-middle proxy, supports modifying non-standard\n    protocols on the fly\n-   [Pytbull-NG](https://github.com/netrunn3r/pytbull-ng/): flexible IDS/IPS testing\n    framework (shipped with more than 300 tests)\n-   [Spoodle](https://github.com/vjex/spoodle): A mass subdomain + poodle\n    vulnerability scanner\n\n### Debugging and reverse engineering\n\n-   [Frida](http://www.frida.re/): A dynamic instrumentation framework which can\n    inject scripts into running processes\n-   [Capstone](http://www.capstone-engine.org/): lightweight\n    multi-platform, multi-architecture disassembly framework with Python\n    bindings\n-   [Unicorn Engine](https://www.unicorn-engine.org/): CPU emulator framework with Python bindings\n-   [Androguard](https://github.com/androguard/androguard): reverse\n    engineering and analysis of Android applications\n-   [Paimei](https://github.com/OpenRCE/paimei): reverse engineering\n    framework, includes [PyDBG](https://github.com/OpenRCE/pydbg), PIDA,\n    pGRAPH\n-   [IDAPython](https://github.com/idapython/src): IDA Pro plugin that\n    integrates the Python programming language, allowing scripts to run\n    in IDA Pro\n-   [PyEMU](hhttps://github.com/codypierce/pyemu/): fully scriptable IA-32\n    emulator, useful for malware analysis\n-   [pefile](https://github.com/erocarrera/pefile): read and work with\n    Portable Executable (aka PE) files\n-   [pydasm](https://github.com/jtpereyda/libdasm/tree/master/pydasm):\n    Python interface to the [libdasm](https://github.com/jtpereyda/libdasm/tree/master/)\n    x86 disassembling library\n-   [PyDbgEng](http://pydbgeng.sourceforge.net/): Python wrapper for the\n    Microsoft Windows Debugging Engine\n-   [diStorm](https://github.com/gdabah/distorm): disassembler library\n    for AMD64, licensed under the BSD license\n-   [python-ptrace](http://python-ptrace.readthedocs.org/):\n    debugger using ptrace (Linux, BSD and Darwin system call to trace\n    processes) written in Python\n-   [Keystone](http://www.keystone-engine.org): lightweight multi-platform,\n    multi-architecture assembler framework with Python bindings\n-   [PyBFD](https://github.com/Groundworkstech/pybfd/): Python interface\n    to the GNU Binary File Descriptor (BFD) library\n-   [CHIPSEC](https://github.com/chipsec/chipsec): framework for analyzing the\n    security of PC platforms including hardware, system firmware (BIOS/UEFI),\n    and platform components.\n-   [Ghidatron](https://github.com/mandiant/Ghidrathon): The FLARE team's open-source extension to add Python 3 scripting to Ghidra.\n\n### Fuzzing\n\n-   [afl-python](http://jwilk.net/software/python-afl): enables American fuzzy\n    lop fork server and instrumentation for pure-Python code\n-   [Sulley](https://github.com/OpenRCE/sulley): fuzzer development and\n    fuzz testing framework consisting of multiple extensible components\n-   [Peach Fuzzing Platform](https://github.com/MozillaSecurity/peach/):\n    extensible fuzzing framework for generation and mutation based\n    fuzzing (v2 was written in Python)\n-   [untidy](https://github.com/kbandla/python-untidy/): general purpose XML fuzzer\n-   [Powerfuzzer](http://www.powerfuzzer.com/): highly automated and\n    fully customizable web fuzzer (HTTP protocol based application\n    fuzzer)\n-   [Construct](http://construct.readthedocs.org/): library for parsing\n    and building of data structures (binary or textual). Define your\n    data structures in a declarative manner\n-   [Fusil](http://fusil.readthedocs.org/): Python library\n    used to write fuzzing programs\n\n### Web\n\n-   [XSStrike](https://github.com/s0md3v/XSStrike): Advanced XSS detection suite\n-   [Requests](https://requests.readthedocs.io/): elegant and simple HTTP\n    library, built for human beings\n-   [lxml](http://lxml.de/index.html): easy-to-use library for processing XML and HTML; similar to Requests\n-   [HTTPie](http://httpie.org): human-friendly cURL-like command line\n    HTTP client\n-   [Twill](https://twill-tools.github.io/twill/): browse the Web from a command-line\n    interface. Supports automated Web testing\n-   [FunkLoad](https://github.com/nuxeo/FunkLoad): functional and load web\n    tester\n-   [spynner](https://github.com/makinacorpus/spynner): Programmatic web\n    browsing module for Python with Javascript/AJAX support\n-   [mitmproxy](http://mitmproxy.org/): SSL-capable, intercepting HTTP\n    proxy. Console interface allows traffic flows to be inspected and\n    edited on the fly\n-   [spidy](https://github.com/rivermont/spidy/): simple command-line web crawler with page downloading and word scraping\n-   [https://github.com/TrixSec/waymap](Waymap): web vulnerability scanner built for penetration testers\n\n\n### Forensics\n\n-   [Volatility](http://www.volatilityfoundation.org/):\n    extract digital artifacts from volatile memory (RAM) samples\n-   [Rekall](https://github.com/google/rekall):\n    memory analysis framework developed by Google\n-   [TrIDLib](http://mark0.net/code-tridlib-e.html), identify file types\n    from their binary signatures. Now includes Python binding\n\n### Malware analysis\n\n-   [pyew](https://github.com/joxeankoret/pyew): command line hexadecimal\n    editor and disassembler, mainly to analyze malware\n-   [Exefilter](https://github.com/decalage2/exefilter): filter file formats\n    in e-mails, web pages or files. Detects many common file formats and\n    can remove active content\n-   [jsunpack-n](https://github.com/urule99/jsunpack-n), generic\n    JavaScript unpacker: emulates browser functionality to detect\n    exploits that target browser and browser plug-in vulnerabilities\n-   [yara-python](https://github.com/VirusTotal/yara-python):\n    identify and classify malware samples\n-   [phoneyc](https://github.com/honeynet/phoneyc): pure Python\n    honeyclient implementation\n-   [CapTipper](https://github.com/omriher/CapTipper): analyse, explore and\n    revive HTTP malicious traffic from PCAP file\n-   [Cuckoo](https://github.com/cuckoosandbox/cuckoo): Automated malware analysis system\n-   [CAPE](https://github.com/kevoreilly/CAPEv2): Malware configuration and payload extraction\n\n### PDF\n\n-   [pdfminer.six](https://github.com/pdfminer/pdfminer.six):\n    extract text from PDF files\n-   [peepdf-3](https://github.com/digitalsleuth/peepdf-3):\n    Python tool to analyse and explore PDF files to find out if they can be harmful\n-   [Didier Stevens' PDF\n    tools](http://blog.didierstevens.com/programs/pdf-tools): analyse,\n    identify and create PDF files\n-   [pyPDF](https://pypdf.readthedocs.io/): pure Python PDF toolkit: extract\n    info, spilt, merge, crop, encrypt, decrypt...\n\n### Misc\n\n-   [Angr](https://github.com/angr/angr): Powerful binary analysis framework for vulnerability research and exploit development\n-   [ScoutSuite](https://github.com/nccgroup/ScoutSuite): Multi-cloud security auditing tool\n-   [Exomind](https://github.com/jio-gl/exomind):\n    framework for building decorated graphs and developing open-source\n    intelligence modules and ideas, centered on social network services,\n    search engines and instant messaging\n-   [simplejson](https://github.com/simplejson/simplejson/): JSON\n    encoder/decoder, e.g. to use [Google's AJAX\n    API](http://dcortesi.com/2008/05/28/google-ajax-search-api-example-python-code/)\n-   [PyMangle](http://code.google.com/p/pymangle/): command line tool\n    and a python library used to create word lists for use with other\n    penetration testing tools\n-   [Hachoir](https://hachoir.readthedocs.io/en/latest/): view and\n    edit a binary stream field by field \n-   [py-mangle](http://code.google.com/p/pymangle/): command line tool\n    and a python library used to create word lists for use with other\n    penetration testing tools\n-   [wmiexec.py](https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py):\n    execute Powershell commands quickly and easily via WMI\n-   [Pentestly](https://github.com/praetorian-inc/pentestly):\n    Python and Powershell internal penetration testing framework\n-   [hacklib](https://github.com/leonli96/python-hacklib):\n    Toolkit for hacking enthusiasts: word mangling, password guessing,\n    reverse shell and other simple tools\n-   [Certipy](https://github.com/ly4k/Certipy): Active Directory Certificate Services enumeration and abuse tool\n-   [BloodHound.py](https://github.com/fox-it/BloodHound.py): Python-based BloodHound ingestor for Active Directory security assessment\n\n\n### Other useful libraries and tools\n\n-   [Project Jupyter](https://jupyter.org): enhanced interactive \n    shell with many features for object introspection, system shell\n    access, and its own special command system\n-   [Beautiful Soup](http://www.crummy.com/software/BeautifulSoup/):\n    HTML parser optimized for screen-scraping\n-   [matplotlib](https://matplotlib.org): make 2D plots of\n    arrays\n-   [Mayavi](http://code.enthought.com/projects/mayavi/): 3D scientific\n    data visualization and plotting\n-   [RTGraph3D](http://www.secdev.org/projects/rtgraph3d/): create\n    dynamic graphs in 3D\n-   [Twisted](http://twistedmatrix.com/): event-driven networking engine\n-   [Suds](https://github.com/suds-community/suds): lightweight SOAP client for\n    consuming Web Services\n-   [NetworkX](https://networkx.org): graph library (edges, nodes)\n-   [Pandas](http://pandas.pydata.org/): library providing\n    high-performance, easy-to-use data structures and data analysis\n    tools\n-   [pyparsing](https://pypi.org/project/pyparsing/): general parsing\n    module\n-   [lxml](http://lxml.de/): most feature-rich and easy-to-use library\n    for working with XML and HTML in the Python language\n-   [Whoosh](https://github.com/whoosh-community/whoosh): fast, featureful\n    full-text indexing and searching library implemented in pure Python\n-   [Pexpect](https://github.com/pexpect/pexpect): control and automate\n    other programs, similar to Don Libes \\`Expect\\` system\n-   [SikuliX](https://sikulix.github.io/docs/scripts/python/), visual technology\n    to search and automate GUIs using screenshots. Scriptable in\n-   [PyQt](http://www.riverbankcomputing.co.uk/software/pyqt) and\n    [PySide](http://www.pyside.org/): Python bindings for the Qt\n    application framework and GUI library\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faw-junaid%2Fblack-hat-python","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Faw-junaid%2Fblack-hat-python","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faw-junaid%2Fblack-hat-python/lists"}