Requests: https://requests.readthedocs.io/en/latest/
Library for creating fully functional and easy-to-manage HTTP clients
dnspython: https://www.dnspython.org/
Allows you to perform queries on DNS servers with just a few instructions
scanless: https://github.com/vesche/scanless
Uses online port scanners that allow you to scan a given target on the Internet without exposing your IP address.
yara-python: https://github.com/VirusTotal/yara-python
Library that allows you to interact with Yara's rules engine from Python
pymetasploit3: https://github.com/DanMcInerney/pymetasploit3
Library that connects to the MSFRPC service to interact, from Python, with all the modules available in the Metasploit Framework.
scapy: https://scapy.net/
It is used to create, capture and manipulate network packets. It is simple and very powerful when executing pentesting in a network environment.
BeautifulSoup: https://www.crummy.com/software/BeautifulSoup/bs4/doc/
Library for parsing XML or HTML documents, especially useful for web scraping processes.
Selenium: https://selenium-python.readthedocs.io/
Library that allows you to control a web browser (through a Web Driver) and interact with web sites automatically.
Impacket: https://github.com/fortra/impacket
Library that has multiple classes and scripts to run pentesting tests in network environments. Especially useful for executing attacks on Windows networks.
angr: https://docs.angr.io/
This tool allows static and dynamic analysis of binaries. Especially useful for reversing and malware analysis.
Python-nmap: https://pypi.org/project/python-nmap/
Library that allows you to run Nmap from Python and retrieve the results in easy-to-manage data structures from any script.
python-shodan: https://shodan.readthedocs.io/en/latest/
Library that allows you to interact with Shodan and run queries on that platform from your Python scripts.
Library for creating fully functional and easy-to-manage HTTP clients
dnspython: https://www.dnspython.org/
Allows you to perform queries on DNS servers with just a few instructions
scanless: https://github.com/vesche/scanless
Uses online port scanners that allow you to scan a given target on the Internet without exposing your IP address.
yara-python: https://github.com/VirusTotal/yara-python
Library that allows you to interact with Yara's rules engine from Python
pymetasploit3: https://github.com/DanMcInerney/pymetasploit3
Library that connects to the MSFRPC service to interact, from Python, with all the modules available in the Metasploit Framework.
scapy: https://scapy.net/
It is used to create, capture and manipulate network packets. It is simple and very powerful when executing pentesting in a network environment.
BeautifulSoup: https://www.crummy.com/software/BeautifulSoup/bs4/doc/
Library for parsing XML or HTML documents, especially useful for web scraping processes.
Selenium: https://selenium-python.readthedocs.io/
Library that allows you to control a web browser (through a Web Driver) and interact with web sites automatically.
Impacket: https://github.com/fortra/impacket
Library that has multiple classes and scripts to run pentesting tests in network environments. Especially useful for executing attacks on Windows networks.
angr: https://docs.angr.io/
This tool allows static and dynamic analysis of binaries. Especially useful for reversing and malware analysis.
Python-nmap: https://pypi.org/project/python-nmap/
Library that allows you to run Nmap from Python and retrieve the results in easy-to-manage data structures from any script.
python-shodan: https://shodan.readthedocs.io/en/latest/
Library that allows you to interact with Shodan and run queries on that platform from your Python scripts.