1. Arp SpooferA pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
2. Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
3. Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
5. BCA-PhantomA multi-platform HTTP(S) Reverse Shell Server and Client in Python 3