设为首页 收藏本站
查看: 602|回复: 0

[经验分享] python工具集合

[复制链接]

尚未签到

发表于 2017-4-22 09:24:28 | 显示全部楼层 |阅读模式
Network

  • Scapy: send, sniff and dissect and forge network packets. Usable interactivelyor as a library
  • pypcap,Pcapyandpylibpcap:several different Python bindings for libpcap
  • libdnet: low-level networking routines, including interface lookup and Ethernetframe transmission
  • dpkt: fast, simple packet creation/parsing, with definitions for the basicTCP/IP protocols
  • Impacket: craft and decode network packets. Includes supportfor higher-level protocols such as NMB and SMB
  • pynids: libnids wrapper offering sniffing, IP defragmentation, TCP streamreassembly and port scan detection
  • Dirtbags py-pcap: read pcap files without libpcap
  • flowgrep: grep through packet payloads using regular expressions
  • httplib2: comprehensive HTTP client library that supports many featuresleft out of other HTTP libraries
  • Knock Subdomain Scan, enumerate subdomains on a target domain through a wordlist
  • Mallory, man-in-the-middle proxy for testing
  • mitmproxy: SSL-capable, intercepting HTTP proxy. Console interface allows traffic flowsto be inspected and edited on the fly
Debugging and reverse engineering

  • Paimei: reverse engineering framework, includesPyDBG,PIDA, pGRAPH
  • Immunity Debugger: scriptable GUI and command line debugger
  • IDAPython: IDA Pro plugin that integrates the Python programming language, allowingscripts to run in IDA Pro
  • PyEMU: fully scriptable IA-32 emulator, useful for malware analysis
  • pefile: read and work with Portable Executable (aka PE) files
  • pydasm: Python interface to thelibdasmx86disassembling library
  • PyDbgEng: Python wrapper for the Microsoft Windows Debugging Engine
  • uhooker: intercept calls to API calls inside DLLs, and alsoarbitrary addresses within the executable file in memory
  • diStorm64: disassembler library for AMD64, licensed under the BSD license
  • python-ptrace: debugger using ptrace (Linux, BSD and Darwinsystem call to trace processes) written in Python
Fuzzing

  • Sulley: fuzzer development and fuzz testing framework consisting of multipleextensible components
  • Peach Fuzzing Platform: extensible fuzzing framework for generation andmutation based fuzzing
  • antiparser: fuzz testing and fault injection API
  • TAOF, includingProxyFuzz,a man-in-the-middle non-deterministic network fuzzer
  • untidy: general purpose XML fuzzer
  • Powerfuzzer: highly automated and fully customizable web fuzzer (HTTP protocolbased application fuzzer)
  • FileP: file fuzzer. Generates mutated files from a list ofsource files and feeds them to an external program in batches
  • SMUDGE
  • Mistress: probe file formats on the fly and protocolswith malformed data, based on pre-defined patterns
  • Fuzzbox: multi-codec media fuzzer
  • Forensic Fuzzing Tools: generate fuzzed files, fuzzedfile systems, and file systems containing fuzzed files in order to test the robustness of forensics tools and examination systems
  • Windows IPC Fuzzing Tools: tools used to fuzzapplications that use Windows Interprocess Communication mechanisms
  • WSBang: perform automated security testing of SOAP based web services
  • Construct: library for parsing and building of data structures (binary ortextual). Define your data structures in a declarative manner
  • fuzzer.py (feliam): simple fuzzerby Felipe Andres Manzano
  • Fusil: Python library used to write fuzzing programs
Web

  • ProxMon: processes proxy logs and reports discovered issues
  • WSMap: find web service endpoints and discovery files
  • Twill: browse the Web from a command-line interface. Supports automated Web testing
  • Windmill: web testing tool designed to let you painlessly automate and debugyour web application
  • FunkLoad: functional and load web tester
Forensics

  • Volatility: extract digital artifacts from volatile memory(RAM) samples
  • SandMan: read the hibernation file, regardless of Windows version
  • LibForensics: library for developing digital forensics applications
  • TrIDLib, identify file types from their binary signatures. Now includesPython binding
Malware analysis

  • pyew: command line hexadecimal editor and disassembler, mainly to analyze malware
  • Exefilter: filter file formats in e-mails, web pages or files. Detectsmany common file formats and can remove active content
  • pyClamAV: add virus detection capabilities to your Pythonsoftware
  • jsunpack-n, generic JavaScript unpacker: emulates browser functionalityto detect exploits that target browser and browser plug-in vulnerabilities
  • yara-python: identify and classifymalware samples
PDF

  • Didier Stevens' PDF tools: analyse, identify and create PDFfiles (includesPDFiD,pdf-parserandmake-pdfandmPDF)
  • Opaf: Open PDF Analysis Framework. Converts PDF to an XML tree that can beanalyzed and modified.
  • Origapy: Python wrapper for the Origami Ruby module which sanitizesPDF files
  • pyPDF: pure Python PDF toolkit: extract info, spilt, merge, crop, encrypt, decrypt...
  • PDFMiner: extract text from PDF files
  • python-poppler-qt4: Python binding for the Poppler PDF library,including Qt4 support
Misc

  • InlineEgg: toolbox of classes for writing small assemblyprograms in Python
  • Exomind: frameworkfor building decorated graphs and developing open-source intelligence modules and ideas, centered on social network services, search engines and instant messaging
  • RevHosts: enumerate virtual hosts for a given IP address
  • simplejson: JSON encoder/decoder, e.g. to useGoogle'sAJAX API
  • PyMangle: command line tool and a python library used to create word listsfor use with other penetration testing tools
  • Hachoir: view and edit a binary stream field by field
Other useful libraries and tools

  • IPython: enhanced interactive Python shell with many features for object introspection,system shell access, and its own special command system
  • Beautiful Soup: HTML parser optimized for screen-scraping
  • matplotlib: make 2D plots of arrays
  • Mayavi: 3D scientific data visualization and plotting
  • RTGraph3D: create dynamic graphs in 3D
  • Twisted: event-driven networking engine
  • Suds: lightweight SOAP client for consuming Web Services
  • M2Crypto: most complete OpenSSL wrapper
  • NetworkX: graph library (edges, nodes)
  • pyparsing: general parsing module
  • lxml: most feature-rich and easy-to-use library for working with XML and HTML inthe Python language
  • Pexpect: control and automate other programs, similar to Don Libes `Expect`system
  • Sikuli, visual technology to search and automate GUIs using screenshots.Scriptable inJython
  • PyQtandPySide:Python bindings for the Qt application framework and GUI library
For more libaries, please have a look atPyPI,the Python Package Index.

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-367593-1-1.html 上篇帖子: python getopt使用 . 下篇帖子: Python运维脚本
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表