{"id":13642657,"url":"https://github.com/ustayready/python-pentesting","last_synced_at":"2025-08-20T03:31:04.321Z","repository":{"id":51165583,"uuid":"243832195","full_name":"ustayready/python-pentesting","owner":"ustayready","description":"Just a repo of random Python scripts to get pentesters started with the Python language on engagements.","archived":false,"fork":false,"pushed_at":"2020-02-29T06:20:09.000Z","size":18,"stargazers_count":212,"open_issues_count":0,"forks_count":61,"subscribers_count":8,"default_branch":"master","last_synced_at":"2024-12-09T06:02:05.331Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ustayready.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-02-28T18:48:06.000Z","updated_at":"2024-11-10T08:22:11.000Z","dependencies_parsed_at":"2022-09-22T17:01:46.235Z","dependency_job_id":null,"html_url":"https://github.com/ustayready/python-pentesting","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ustayready%2Fpython-pentesting","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ustayready%2Fpython-pentesting/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ustayready%2Fpython-pentesting/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ustayready%2Fpython-pentesting/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ustayready","download_url":"https://codeload.github.com/ustayready/python-pentesting/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":230388131,"owners_count":18217755,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-02T01:01:34.538Z","updated_at":"2024-12-19T06:09:22.451Z","avatar_url":"https://github.com/ustayready.png","language":"Python","funding_links":[],"categories":["Python"],"sub_categories":[],"readme":"Python for Pentesters\r\n==================\r\n\r\n## Overview ##\r\nGetting started with Python for pentesting and red team engagements is fairly easy! This repo is just a small collection of random scripts to help get you started.\r\n\r\n**Brought to you by:**\r\n\r\n![Black Hills Information Security](https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/BHIS-logo-L-300x300.png \"Black Hills Information Security\")\r\n\r\n## Examples: by Mike Felch (@ustayready) and Joff Thyer (@joff_thyer) ##\r\nThis code is provided purely for educational purposes.\r\n\r\n * pivot_winrm.py: shows how to use Python with winrm to execute commands on a remote machine\r\n * cloud_aws_s3.py: search AWS S3 buckets for sensitive filenames\r\n * cloud_aws_secrets.py: Dump all the secrets in AWS Secrets Manager\r\n * cloud_azure_ad.py: Dumping AzureAD users\r\n * cloud_gsuite_backdoor.py: Backdooring G Suite accounts for full access\r\n * cloud_gsuite_email.py: Reading GMail emails\r\n * crack_jwt.py: Cracking JSON web tokens\r\n * live_host_discovery.py: Discovering live hosts on a network\r\n * live_port_discovery.py: Discovering open ports on a host\r\n * passwords_attack.py: Trying username/password combinations on a web authentication portal\r\n * pivot_psremoting.py: Pivoting in a Windows environment using PSRemoting\r\n * pivot_wmi.py: Pivoting in a Windows environment using WMI\r\n * shodan_search.py: Searching for internet connected devices on Shodan\r\n * socket_c2_client.py: C2 socket client\r\n * socket_c2_server.py: C2 socket server\r\n * web_brute.py: Brute forcing web paths for unknown attack surfaces\r\n * web_robots.py: Downloading the robots.txt for URLs\r\n * web_sniff.py: Sniffing HTTP packets\r\n * web_spa.py: Interacting with a single page app with a headless browser then copying session cookies to the requests library\r\n * pymeta.py: Read all files in a directory recursively and extracts metadata from any office documents, and PDFs discovered\r\n * powerstrip.py: Strips comments out of a PowerShell script, and writes a file with -stripped as part of the filename\r\n * pyinjector.py: Using ctypes to execute shellcode within the same process or inject into a remote process using thread manipulation\r\n\r\n\r\n\r\n\r\n\r\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fustayready%2Fpython-pentesting","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fustayready%2Fpython-pentesting","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fustayready%2Fpython-pentesting/lists"}