Whitehat
Features
- DDoS (Can up to 1500+ Requests per seconds)
- Get Phonenumber Info
- More features soon!
Install
pip install whitehat
pip install whitehat
pybotnet A Python Library for building botnet , trojan or backdoor for windows and linux with Telegram control panel Disclaimer: Please note that this
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicious embedded code), typosquatting analysis, the history of versions and reported vulnerabilities (CVEs) of the package.
Vacuna Inject everything! Vacuna is a little library to provide dependency management for your python code. Install pip install vacuna Usage import va
What is Buff? A simple BOF library I wrote under an hour to help me automate with BOF attack. It comes with fuzzer and a generic method to generate ex
This preserves the early code of a Python decompiler for Python versions 1.5 to 2.4. I have been able to install this using pyenv using Python 2.3.7 u
Python Code Obfuscator A script that converts code into full on random numerical expressions. Simple Scripts: Python Mode... Input: Function that deco
Python Code Obfuscator A script that converts code into full on random numerical expressions. Simple Scripts: Python Mode... Input: Function that deco
Whois-Python-GUI Get Whois Domain with Python - GUI :) WARNING Dont Copy ! - W
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Your FOSSA integration was successful! Attached in this PR is a badge and license report to track scan status in your README.
Below are docs for integrating FOSSA license checks into your CI:
Updating the whole cryptography
function + added more features, such as Binary
and Morse
cryptography
function, such as Binary
and Morse
Like always bruh
enhancement Readme files sus mergedExample: from class().location() you can do: class().location
Make it more professional, most developers like to be able to put what functions return to their advantage, using print isnt professional and useless.
Very important if you want to make a library.
mergedRemoving useless variable make your lib looks readable and not confusing, also make it more professional.
Updates :
Changelogs and Updates can be seen in the gist changelogs.
pip install whitehat==1.2
v1.2 Features :
Features :
Version 2.0 will be scheduled to be released after the new year 2022 or the end of December. Join our Discord server for more information
Source code(tar.gz)log4shell-poc-py POC for detecting the Log4Shell (Log4J RCE) vulnerability. Run on a system with python3 python3 log4shell-poc.py pathToTargetFile
TTUN Server The self-hostable proxy tunnel. Running Running: docker run -e TUNNEL_DOMAIN=Your tunnel domain -e SECURE=True if using SSL ghcr.io/to
OMIGOD Proof on Concept Exploit for CVE-2021-38647 (OMIGOD) For background information and context, read the our blog post detailing this vulnerabilit
PYTHON-EXPLOITATION This is a repository filled with scripts that were made with Python, and designed to exploit computer systems. Networking tcp_clin
licence_software_test_app Make sure you set your database values in a .env file to the folder. Install MYSQL connector: pip install mysql-connector-py
A script based on sqlmap that uses sql injection vulnerabilities to traverse the existence o
CVE-2021-40346-POC CVE-2021-40346 integer overflow enables http smuggling Reference: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021
django-permissions-policy Set the draft security HTTP header Permissions-Policy (previously Feature-Policy) on your Django app. Requirements Python 3.
CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain device credentials.
client attack remotely , this script was written for educational purposes only, do not use against to any victim, which you do not have permission for it
CVE-2022-21907 - Double Free in http.sys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request he
cttt-decomp A decompilation of the Nintendo Switch version of Captain Toad: Trea
Vuln Impact On November 15, 2021, A security researcher disclosed that there was an unauthorized access vulnerability in Hadoop yarn RPC. This vulnera
scancss Fastest tool to find XSS. scancss is a fastest tool to detect Cross Site scripting (XSS) automatically and it's also an intelligent payload ge
Unauthenticated Sqlinjection that leads to dump database but this one impersonated Admin and drops a interactive shell
pyXSSPlatform Used to build an XSS platform on the command line. Usage: 1.generate the cert file You can use openssl like this: openssl req -new -x509
ShadowCoerce MS-FSRVP coercion abuse PoC Credits: Gilles LIONEL (a.k.a. Topotam)
log4j-scan A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts Features Support for lists of URLs. Fuzzing for more
Opensource Project Simple Python Password Generator This repository is just for peoples who want to generate strong-passwords for there social-account
Qbot-Strings-Decrypter An IDA pro python script to decrypt Qbot malware strings.