This repository contains Black Hat Python based penetration testing and security research scripts designed to demonstrate how attackers may exploit systems using automation and scripting. The projects focus on understanding real world attack techniques so that security professionals, students, and defenders can identify weaknesses, improve detection, and strengthen defenses.
The repository is intended for hands on coding and learning, covering common offensive security concepts such as networking, enumeration, brute force logic, payload handling, and automation using Python.
Understanding attacker techniques is essential for building strong defenses. By studying these scripts, learners can:
- Recognize common attack patterns
- Detect malicious behavior in logs and network traffic
- Improve incident response and system hardening
- Build defensive strategies based on attacker mindset
This repository promotes security awareness and responsible learning.
This project is created strictly for educational and ethical purposes. All scripts must be used only on systems you own or have explicit permission to test. The author is not responsible for any misuse, damage, or illegal activity resulting from the use of this code.
Unauthorized use of these scripts against live systems is illegal and unethical.
- Basic Network Tools
- Sniffer Tools
- Network Tools for Scapying
- Web Pen testing Python Codes
- Brup Proxy
- Command And Control
- Malware (Trojan)
- File Exfiltration
- Windows Privilege Escalation
- Forensics