{"id":24708104,"url":"https://github.com/pungrumpy/black-hat-python-for-pentesters","last_synced_at":"2025-09-11T05:09:09.069Z","repository":{"id":234838462,"uuid":"625596844","full_name":"PunGrumpy/Black-Hat-Python-For-Pentesters","owner":"PunGrumpy","description":"Learn how to write python scripts in order to perform pentesting on Windows and Linux Machines","archived":false,"fork":false,"pushed_at":"2023-04-12T18:06:35.000Z","size":109,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-22T06:13:24.927Z","etag":null,"topics":["pentesting","python"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/PunGrumpy.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2023-04-09T15:51:18.000Z","updated_at":"2023-04-15T16:28:49.000Z","dependencies_parsed_at":"2024-04-21T03:18:35.021Z","dependency_job_id":"868825c1-b34b-4d2b-b92d-88d1cc93ca85","html_url":"https://github.com/PunGrumpy/Black-Hat-Python-For-Pentesters","commit_stats":null,"previous_names":["pungrumpy/black-hat-python-for-pentesters"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/PunGrumpy/Black-Hat-Python-For-Pentesters","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/PunGrumpy%2FBlack-Hat-Python-For-Pentesters","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/PunGrumpy%2FBlack-Hat-Python-For-Pentesters/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/PunGrumpy%2FBlack-Hat-Python-For-Pentesters/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/PunGrumpy%2FBlack-Hat-Python-For-Pentesters/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/PunGrumpy","download_url":"https://codeload.github.com/PunGrumpy/Black-Hat-Python-For-Pentesters/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/PunGrumpy%2FBlack-Hat-Python-For-Pentesters/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":274579929,"owners_count":25311049,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-09-11T02:00:13.660Z","response_time":74,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["pentesting","python"],"created_at":"2025-01-27T06:27:46.901Z","updated_at":"2025-09-11T05:09:09.030Z","avatar_url":"https://github.com/PunGrumpy.png","language":"Python","readme":"# Black Hat: Python For Pentesters\n\nLearn how to write python scripts in order to perform pentesting on Windows and Linux Machines\n\n## Pentestation Testing\n\n- Pentesting evaluates system and network security\n- Identifies vulnerabilities and the potential for exploit by malicious parties\n- Only performed on authorized systems; formal, written permission should be obtainedfor legal reasons\n\n## Pentesting Methodology\n\n- Reconnaissance: gathering information about target\n- Scanning/Footprinting: technical assessment of potential openings\n- Gaining Access: utilize exploits to enter system\n- Maintain Access: ensure persistent connection to target for data gathering and extraction\n- Covering Tracks: hide traces that an attack occurred\n\n## Python Pentesting\n\n- Provieds the ability to craft attacks that don't have an existing signature\n- Automates a variety of tasks, such as device enumeration\n- Integrates well with existing tools, e.g. python-nmap\n- General purpose nature expands use beyond pentesting and hacking, such as data analysis, text editing, etc.","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpungrumpy%2Fblack-hat-python-for-pentesters","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fpungrumpy%2Fblack-hat-python-for-pentesters","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpungrumpy%2Fblack-hat-python-for-pentesters/lists"}