All Projects → ninijay → Pycurity

ninijay / Pycurity

Licence: gpl-3.0
Python Security Scripts

Programming Languages

python
139335 projects - #7 most used programming language
python2
120 projects

Projects that are alternatives of or similar to Pycurity

Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+736.7%)
Mutual labels:  scanner, hacking-tool, nmap
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+89.45%)
Mutual labels:  scanner, hacking-tool, nmap
nmap-formatter
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot). Simply put it's nmap converter.
Stars: ✭ 129 (-40.83%)
Mutual labels:  scanner, nmap, port-scanner
Silver
Mass scan IPs for vulnerable services
Stars: ✭ 588 (+169.72%)
Mutual labels:  scanner, nmap, port-scanner
Vault
swiss army knife for hackers
Stars: ✭ 346 (+58.72%)
Mutual labels:  scanner, hacking-tool, port-scanner
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+441.28%)
Mutual labels:  hacking-tool, nmap, port-scanner
Dark Fantasy Hack Tool
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-39.91%)
Mutual labels:  hacking-tool, port-scanner
Nimscan
🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-38.53%)
Mutual labels:  scanner, port-scanner
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+784.4%)
Mutual labels:  scanner, hacking-tool
Whatcms
CMS Detection and Exploit Kit based on Whatcms.org API
Stars: ✭ 205 (-5.96%)
Mutual labels:  scanner, hacking-tool
Pbscan
Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
Stars: ✭ 122 (-44.04%)
Mutual labels:  nmap, port-scanner
Enteletaor
Message Queue & Broker Injection tool
Stars: ✭ 139 (-36.24%)
Mutual labels:  scanner, hacking-tool
Asset Scan
asset-scan是一款适用甲方企业的外网资产周期性扫描监控系统
Stars: ✭ 149 (-31.65%)
Mutual labels:  nmap, port-scanner
Awesome Internet Scanning
A curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source projects.
Stars: ✭ 130 (-40.37%)
Mutual labels:  nmap, port-scanner
Penta
Open source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-40.37%)
Mutual labels:  scanner, nmap
Nwatch
🔍 Tool for - Host Discovery, Port Scanning and Operating System Fingerprinting
Stars: ✭ 127 (-41.74%)
Mutual labels:  scanner, nmap
Unimap
Scan only once by IP address and reduce scan times with Nmap for large amounts of data.
Stars: ✭ 141 (-35.32%)
Mutual labels:  scanner, nmap
Recsech
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-20.64%)
Mutual labels:  scanner, hacking-tool
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+960.55%)
Mutual labels:  scanner, hacking-tool
Webmap
A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-13.76%)
Mutual labels:  hacking-tool, nmap

pycurity

A list of python hacking scripts I wrote with the guide of this book

This is a current work in progress.

I also have some PenTesting/ Hacking and Coding videos on my YouTube Channel if you're into that.

As soon as I've finished the book, I'll fork this project and create a more usefull pentesting-framework.

List of Scripts and what they do:

crackers

unzip.py

A simple zip-pw dictionary cracker.

Usage:

python unzip.py -f <zipfile> -d <dictionary_file>

This script will crack a pw- protected zip file with a dictionary list. It will create a pseudo- Thread for each dictionary_file line to speed up the process.

metasploit

conficker.py

Clone of conficker exploit

Usage:

python -H <RHOST[s]> -l <LHOST> [-p <LPORT> -F <Password File>]

Simplifies the process of creating a conficker exploit by handling all the configuration and launching the exploit via msf.

scanners

port_scanner.py

A port scanner for hostnames/ips and port(s)

Usage:

python port_scanner.py -H <ip-adress> -p <single port>
python port_scanner.py -H <ip-adress> -p "<mutliple ports separated by comma>"
# eg for multiple port scan
python port_scanner.py -H 127.0.0.1 -p "20, 21, 443"

nmap_port_scanner.py

Same as port_scanner.py but with nmap integration.

simple_vuln_scanner.py

A simple scanner for common vulnerabilities.

Usage:

python simple_vuln_scanner.py <vuln_list.txt>

vuln_list.txt can contain banner info like

  • "FreeFloat FTP Server"
  • "3Com 3CDaemon FTP Server Version 2"

as suggested by the book. Not limited to FTP- Services.

Scans some ports in a range of IP- Adresses to get vulnerable services.

ssh

ssh_dictionary.py

A simple brute-forcer for ssh connections, using a dictionary.

Usage:

python ssh_dictionary.py -H <hostname> -u <username> -F <password- file>

Tries to brute- force an ssh connection for a given user using a dictionary.

Disclosure

This Readme may contain affiliate marketing links, which means I may get paid commission on sales of those products or services we write about. My content is not influenced by advertisers or affiliate partnerships. This disclosure is provided in accordance with the Federal Trade Commission’s 16 CFR § 255.5: Guides Concerning the Use of Endorsements and Testimonials in Advertising.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].