Python
Java
JavaScript
Android
Golang
C/C++
Swift
PHP
Node.js
Ruby
.NET
More
React
Linux
Rust
Vue.js
Flutter
Deep Learning
Web Frameworks
Networking
Web Crawling
Database
More...
Home
/
Python
/
Security related resources
Security related resources
python security related resources
Search
Newest releases
Newest releases
Most popular
Security related res
40
Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel cra...
CVE-2022-21907 - Double Free in http.sys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request he
Security related res
291
HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907
CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP
Security related res
4
CVE-2021-32099 SQLi allow attacker bypass login. From HTB with love
CVE-2021-32099 SQLi Bypass login Useful when trying to read User Flag on Pandora.htb CVE-2021-32099 SQLi allow attacker bypass login. Target Exploit o
Security related res
8
Methods & Tools for Mobile Malware Spyware & Forensics
Mobile & IOT Malware, Spyware, & Forensic Analysis Author: Jonathan Scott Twitter: @jonathandata1 Version 1.0 This repository contains methods, and to
Security related res
47
A list of open source web security scanners
open-source-web-scanners A list of open source web security scanners on GitHub. General Purpose Web Scanners Main Site Last Commit Committers Stars Ar
Security related res
3
Ultimate phishing tool ,A beginners friendly, Automated phishing tool in python. Author is...
🅼🅰🅳🅴 🆆🅸🆃🅷 🅿 🆈🆃🅷🅾🅽 🆅 🅿 🅷🅸🆂🅷🅴🆁 [+] 𝕯𝖊𝖘𝖈𝖗𝖎𝖕𝖙𝖎𝖔𝖓 : Ultimate phishing tool ,A beginners friendly, Automated phishing tool
Security related res
4
Fast and easy way to rollout on multiple GitLab project file a particular content.
Volatile Fast and easy way to rollout on multiple GitLab project file a particular content. Why ? After looking for a tool to simply enforce a develop
Security related res
4
Android Hacking Method 2022
Program Features - 📌 Hack all Android phones. - 📌 Failure to detect antivirus. - 📌 Superior encryption - 📌 Source provided - 📌 100 ٪ FUD - 📌 It
Security related res
13
A small script I made that takes any standard Decklist of magic the gathering cards and pu...
README This small script takes any decklist from an MTGO list and pulls all card images as jpg or png files into your directory. If you like this pr
Security related res
30
Useful resources about phishing email analysis
Phishing Email Analysis Useful tools MX Lookup Online URL/Attachment Analysis Tools AnyRun Browserling Hybrid Analysis urlscan Reputation Check Virust
Security related res
9
This is a Password database I made for myself, as I want to keep all my passwords in the s...
This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file. And so I made this simple password database, that can encrypt, decrypt
Security related res
292
Cuckoo 3 is a Python 3 open source automated malware analysis system.
Cuckoo 3 Cuckoo 3 is a Python 3 open source automated malware analysis system. For setup instructions, please refer to our documentation. This is a de
Security related res
4
A passive-recon tool that parses through found assets and interacts with the Hackerone API...
Hackerone Passive Recon Tool A passive-recon tool that parses through found assets and interacts with the Hackerone API. Setup Simply run setup.sh to
Security related res
6
Automated tool to find & created Exploit Poc for Clickjacking Vulnerability
ClickJackPoc This tool will help you automate finding Clickjacking Vulnerability by just passing a file containing list of Targets . Once the Target i
Security related res
10
Tenssens framework focused on gathering information from free tools or resources. The inte...
Tenssens - OSINT Framework Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free
Security related res
4
⚡ PoC: Hide a c&c botnet in the discord client. (Proof Of Concept)
Discord-BotnetClient Embed C&C botnet into the discord client. Working trought websocket c&c server. How to use. pip3 install websocket_server colored
Security related res
4
Clickjacking Tool
CLICK-Jack It is a automatic tool to find Clickjacking Vulnerability in various Web applications. What is Clickjacking ? Clickjacking, also known as a
Security related res
17
SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)
Bad Blood Bad Blood is an exploit for CVE-2021-20038, a stack-based buffer overflow in the httpd binary of SMA-100 series systems using firmware versi
Security related res
7
Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.
Log4jHorizon Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more. Crossing the Log4j Horizon - A Vulnerability With No Retu
Security related res
4
Ghidra scripts to help with 3ds reverse engineering
3ds Ghidra Scripts These are ghidra scripts to help with 3ds reverse engineering. Features: Labels, comments (when inlined), and bookmarks svc use Lab
Security related res
23
CVE-2021-42342 RCE
CVE-2021-42342 RCE
Security related res
6
Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384
CVE-2021-45383 & CVE-2021-45384 There are several network-layer vulnerabilities in the official server of Minecraft: Bedrock Edition (aka Bedrock Serv
Security related res
6
Information Gathering Tool
Ψ Information Gathering Through Link STILL TESTING About Psi Gets The Information About browser and Device of User. Get exact location and cam snap. H
Security related res
8
Scripts and notes on my malware analysis journey
Malware Arcane Repository of notes and scripts I use when doing malware analysis Qakbot Some scripts that can be useful when dealing with Qakbot fiddb
Security related res
11
Malicious shortcut generator for collecting NTLM hashes from insecure file shares.
Lnkbomb Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for an icon fi
Security related res
7
Cowrie SSH/Telnet Honeypot
Cowrie Welcome to the Cowrie GitHub repository This is the official repository for the Cowrie SSH and Telnet Honeypot effort. What is Cowrie Cowrie is
Security related res
1.4k
Kippo - SSH Honeypot
NOTE: For more recent development, check out Michel Oosterhof's fork Kippo Kippo is a medium interaction SSH honeypot designed to log brute force atta
Security related res
2.8k
SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, se...
ssh-audit ssh-audit is a tool for ssh server auditing. Features SSH1 and SSH2 protocol server support; grab banner, recognize device or software and o
Security related res
15
Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.
Log4jUnifi Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more. Another Log4j on the fire: Unifi Why? Proof of c
Security related res
39
MS-FSRVP coercion abuse PoC
ShadowCoerce MS-FSRVP coercion abuse PoC Credits: Lionel GILLES (a.k.a. Topotam) Source: https://twitter.com/topotam77/status/1475701014204461056 Expl
Security related res
49
Environment with vulnerable kernel for exploitation of CVE-2021-44733
CVE-2021-44733: Fuzzing and exploitation of a use-after-free in the Linux kernel TEE subsystem Recently a use-after-free vulnerability was discovered
Security related res
35
Linux Security and Monitoring Scripts
Linux Security and Monitoring Scripts These are a collection of security and monitoring scripts you can use to monitor your Linux installation for sec
1
2
3
4
5
6
7
8
9
10
Categories
Python
21917
Learning Tutorial
1304
Admin Panels
9
Algorithms and Design Patterns
38
Authentication
28
Build Tools
15
Caching
16
CMS
143
Code Analysis
39
Code review tool
12
Command-line Tools
880
Computer Vision
29
Concurrency and Parallelism
14
Configuration
13
Cryptography
50
Data Analysis
245
Data Visualization
370
Database
127
Database Drivers
46
Date and Time
19
Debugging Tools
49
Deep Learning
15204
DevOps Tools
65
Distribution
13
Documentation
36
Downloader
74
E-commerce
7
Editor Plugins
41
Email
74
Environment Management
14
Files
67
Forms
7
Functional Programming
24
Game Development
330
Geolocation
53
GUI Development
101
Hardware
248
HTML Manipulation
26
HTTP Clients
25
IDE
42
Image Processing
255
Interactive Interpreter
20
Internationalization
1
Job Scheduler
19
JSON
28
Logging
34
Microsoft Windows
2
Miscellaneous
3714
Natural Language Processing
1081
Network Virtualization
8
Networking
316
ORM
26
Package Management
27
Package Repositories
11
Performance optimization
23
RESTful API
48
RPC Servers
6
Search
30
Security related resources
1029
Serialization
3
Specific Formats Processing
46
Static Site Generator
10
Task Queues
12
Template Engine
8
Testing
132
Third-party APIs
673
URL Manipulation
11
Video
159
Web Asset Management
4
Web Content Extracting
10
Web Crawling
152
Web Frameworks
320
WSGI Servers
9
Most popular
More
01
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTP...
02
A JavaScript / Python / PHP cryptocurrency trading API with support for more than 120 bitc...
03
Automatic SQL injection and database takeover tool
04
面向开发人员梳理的C/C++安全指南、JavaScript安全指南、Node安全指南、Go安全指南、Java安全指南、Python安全指南
05
Most advanced XSS scanner.
06
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/...
07
Exploitation Framework for Embedded Devices
08
Most advanced XSS scanner.
09
OpenSnitch is a GNU/Linux port of the Little Snitch application firewall
10
BYOB (Build Your Own Botnet)