'SECURITY/Python'에 해당되는 글 6건

  1. [자료] 파이썬을 활용한 업무 자동화
  2. [Tool] 파이썬 기반 도구 모음
  3. [Tool] Py2Exe Decompiler
  4. [정리] ocr 라이브러리 pytesser import 및 예제
  5. [자료] 파이썬 url 인코딩/디코딩, 해시, 문자 빈도수 출력
  6. [자료] 파이썬 공부자료 모음

[자료] 파이썬을 활용한 업무 자동화

https://www.slideshare.net/plusjune/ss-110416117

[Tool] 파이썬 기반 도구 모음

악성코드 검색 

https://github.com/MalwareReverseBrasil/malwaresearch


익스플로잇 검색

https://github.com/vulnersCom/getsploit


링크드인에서 정보검색

https://github.com/dchrastil/ScrapedIn


Online Hash Checker for Virustotal and Other Services

https://github.com/Neo23x0/munin


Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing

http://www.kitploit.com/2017/08/nili-tool-for-network-scan-man-in.html


PcapXray

https://github.com/Srinivas11789/PcapXray


포트스캐너

IP 노출 하지 않고 온라인 공개되어 있는 port 스캐너를 이용해서 포트스캔

https://github.com/vesche/scanless


XSS자동화

https://github.com/UltimateHackers/XSSight

https://securityonline.info/brutexss-v1-5-cross-site-scripting-tool/?utm_source=ReviveOldPost&utm_medium=social&utm_campaign=ReviveOldPost


post-exploitation framework

https://github.com/EmpireProject/Empire

https://github.com/interference-security/empire-web


파일 업로드 취약점 스캔

https://github.com/almandin/fuxploider


SQL Injection 취약점 검색

https://securityonline.info/visql-scan-sql-vulnerability-target-site-sites-server/


WAF BYPASS

https://github.com/SndVul/WAF_Bypass_Helper


jpeg 분석

https://blog.didierstevens.com/2018/01/29/new-tool-jpegdump-py/


Next Generation Firewall Bypass Tool

https://securityonline.info/fireaway-next-generation-firewall-bypass-tool/


detecting a firewall on a web application, and attempting to detect a bypass

https://github.com/Ekultek/WhatWaf


Malicious document

https://zairon.wordpress.com/2017/08/16/prothemus1-python-script-creates-malicious-document/


워드프레스 attack suite

http://www.kitploit.com/2017/04/wpforce-wordpress-attack-suite.html?utm_source=dlvr.it&utm_medium=facebook

https://www.n00py.io/2017/03/squeezing-the-juice-out-of-a-compromised-wordpress-server/


워드프레스 취약점 스캐너

https://github.com/m4ll0k/WPSeku

https://www.darknet.org.uk/2017/11/wpseku-black-box-remote-wordpress-security-scanner/

https://github.com/m4ll0k/WPSploit


S3 스캐너

https://github.com/sa7mon/S3Scanner


watchdog

https://github.com/flipkart-incubator/watchdog


ForensicPCAP

python을 활용한 pcap 분석 도구

https://github.com/madpowah/ForensicPCAP


ZARP

네트워크 공격

http://hack-tools.blackploit.com/2014/10/zarp-local-network-attack-framework.html?utm_source=dlvr.it&utm_medium=facebookd


analyzeDFIR

https://github.com/analyzedfir/analyzepf


morpheus

https://github.com/r00t-3xp10it/morpheus


풋프린팅

설명 

http://www.spiderfoot.net/


zip 크랙

https://blog.didierstevens.com/2017/05/20/update-zipdump-py-version-0-0-7/


인스타그램 brute

https://www.kitploit.com/2018/01/instagram-py-simple-instagram-brute.html


BruteSpray

BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.

https://github.com/x90skysn3k/brutespray


파이썬 키로거

https://github.com/mehulj94/Radium-Keylogger


undetected backdoor

https://github.com/Eitenne/TopHat


이메일 정보 수집

https://github.com/cys3c/infoga


칼리 툴을 리눅스에서 사용하게 하는 도구

https://github.com/lbarman/kali-tools


Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.

https://github.com/cryps1s/DARKSURGEON


Belati - The Traditional Swiss Army Knife for OSINT

http://www.kitploit.com/2017/06/belati-traditional-swiss-army-knife-for.html


wifite2

https://github.com/derv82/wifite2


create malicious document 

https://zairon.wordpress.com/2017/06/12/prothemus1-python-script-creates-malicious-document/


NXcrypt - Python Backdoor Framework

http://www.kitploit.com/2017/06/nxcrypt-python-backdoor-framework.html


SDNpwn toolkit

https://sdnpwn.net/tools/sdnpwn/


GIT miner

https://github.com/UnkL4b/GitMiner


bad pdf

https://github.com/deepzec/Bad-Pdf


team viewer pass dump

https://github.com/vah13/extractTVpasswords

----

vulscan nmap과 연동해서 취약점 검색

https://github.com/scipag/vulscan


RED HAWK - All In One Tool For Information Gathering, SQL Vulnerability Scannig and Crawling

http://www.kitploit.com/2017/06/red-hawk-red-hawk-is-all-in-one-tool.html?utm_source=dlvr.it&utm_medium=twitter


The Fastest Mixed Packet Injector Tool

https://www.darknet.org.uk/2017/07/t50-fastest-mixed-packet-injector-tool/


app blackbox assessment tool

https://github.com/chaitin/passionfruit


web-nmap

https://www.kitploit.com/2018/11/webmap-nmap-web-dashboard-and-reporting.html?utm_source=dlvr.it&utm_medium=facebook&m=1&fbclid=IwAR1H17VP6hkGWf7OjTwKk3jZyaEIMCNiXYTLz6qGq2LkZD79lWPGkCevabg


패킷캡쳐, 다이어그램

https://github.com/Srinivas11789/PcapXray


ssh pass steal

https://github.com/mthbernardes/sshLooter


패스워드 복구

https://github.com/AlessandroZ/LaZagne


오픈소스 도구 모음

https://github.com/We5ter/Scanners-Box


한글 취약점 스캐너

http://www.nurilab.net/hwpscan2


웹 어플리케이션 취약점 스캐너

https://www.vegabird.com/vooki/


linux-soft-exploit-suggester

https://github.com/belane/linux-soft-exploit-suggester

[Tool] Py2Exe Decompiler

https://github.com/endgameinc/Py2ExeDecompiler

[정리] ocr 라이브러리 pytesser import 및 예제

pip로 설치가 안되서 수동으로 import 해야한다. 


여기서 라이브러리를 받고 압축을 풀면 나오는 폴더를 pytesser로 이름을 변경하고 C:\Python27\Lib 경로에 저장한다.


pytesser.py를 복사하고 __init__.py 이름을 변경한 후 12라인을 tesseract_exe_name = 'C:\\Python27\\Lib\\pytesser\\tesseract' 로 변경하면 끝.


[자료] 파이썬 url 인코딩/디코딩, 해시, 문자 빈도수 출력

출처 : http://cdpython.tistory.com/16


파이썬에서 url 인코딩 / 디코딩


1
2
3
4
5
6
7
from urllib import quote,unquote
#인코딩
def urlencode(string):
    print "URLEncoding:",quote(string)
#디코딩
def urldecode(string):
    print "URLDecoding:",unquote(string)



해시(md5,sha1) 생성


1
2
3
4
5
6
7
8
9
10
11
12
13
import hashlib
def hash_string(string):
    print "MD5:",hashlib.md5(string).hexdigest()
    print "SHA1:",hashlib.sha1(string).hexdigest()
#파일 해시 생성
def hash_file(file_path):
    try:
        f = open(file_path,'rb').read()
    except Exception as e:
        print "Faild to open file [%s]" % file_path
        return
    print "MD5:",hashlib.md5(f).hexdigest()
    print "SHA1:",hashlib.sha1(f).hexdigest()



입력 가능한 모든 문자열에서 빈도수 top 5 출력


1
2
3
4
5
6
7
8
9
10
11
12
13
from string import lowercase,uppercase
from operator import itemgetter
def letter_count(string):
     result=[]
     print_able=lowercase+uppercase+"0123456789!@#$%^&*()_+-=[]{}:;''/?.>,<`~"
     for i,j in enumerate(print_able):
         result.append([i,string.count(j)])
         #print j,string.count(j)
     print "\n[+]Top 5!!\n"
     #itemgetter 해당 item의 2번째 값으로 정렬 후 내림차순으로
     result=sorted(result, key=itemgetter(1), reverse=True)
     for i in range(5):
         print "Top"+`i+1`,print_able[result[i][0]],result[i][1]


[자료] 파이썬 공부자료 모음

======================튜토리얼============================


점프 투 파이썬

https://wikidocs.net/book/1


예제로 배우는 파이썬 

http://pythonstudy.xyz/


예제 코드

https://www.pythonforbeginners.com/code-snippets-source-code/python-code-examples


파이썬 300제

https://wikidocs.net/book/922


파이썬 기초

http://www.flowdas.com/thinkpython/

http://www.lucypark.kr/courses/tips/introduction-to-python.html


파이썬을 배우는 최고의 방법

https://nolboo.github.io/blog/2014/08/10/the-best-way-to-learn-python/


free e-book

https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md


해킹, C, 파이썬, 안드로이드 튜토리얼

http://www.fromdev.com/search/label/Tutorials


What a C programmer should know about memory

http://marek.vavrusa.com/c/memory/2015/02/20/memory/


========================================================






========================설치관련===========================


내 컴퓨터 - 속성 - 고급 - 환경변수

PATH 수정 - C:\Python27

PYTHONPATH 추가 - C:\Python27\Lib


sublime 

http://webdir.tistory.com/396


pip 설치

http://www.lucypark.kr/blog/2013/02/06/python-and-ipython-on-windows/


py2exe

http://thecoollife.tistory.com/704

http://www.dreamy.pe.kr/zbxe/CodeClip/15123


웹 IDE

http://blog.gaerae.com/2015/06/website-run-execute-code-online.html#.VW8DPs_Go0G


========================================================






========================보안=============================


Introduction to Python for Security Professionals

http://www.primalsecurity.net/introduction-to-python-for-security-professionals/


========================================================






========================크롤링============================


셀레니움, 장고 활용 

https://beomi.github.io/


나라장터 파싱

http://ifyourfriendishacker.tistory.com/2


주식 크롤링 및 DB화

http://dongsamb.com/web-scraping-using-python/


크롤링 좀 더 잘하기

https://github.com/random-robbie/My-Shodan-Scripts?fbclid=IwAR2FMnUQmD_iTFlDF9kr8KjY67Fbir4UMSJFXvSv2c0D0aQZTGMJlzI6H3k


파이썬 뉴스 텍스트 워드 클라우드

http://nbviewer.jupyter.org/gist/FinanceData/6bda99ce6ec5b9de2fd93e204f831561


크롤링, 파싱

http://cpuu.postype.com/post/26176/

https://speakerdeck.com/beomi/gdg-campus-summerparty-sseuldemanheun-web-keurolreo-mandeulgi-with-python


크롤러 강의

https://potentpages.com/web-crawler-development/tutorials/python/

https://medium.freecodecamp.com/how-to-scrape-websites-with-python-and-beautifulsoup-5946935d93fe


========================================================






========================활용관련===========================


조각코드 모음

https://wikidocs.net/book/536

http://mwultong.blogspot.com/

http://snipplr.com/all/language/python

http://www.dreamy.pe.kr/zbxe/CodeClip/165081


라이브러리 검색

https://python.libhunt.com/categories

그래프

https://python-graph-gallery.com/


예외처리

http://blog.naver.com/PostView.nhn?blogId=dudwo567890&logNo=130161392390&parentCategoryNo=&categoryNo=&viewDate=&isShowPopularPosts=false&from=postView


========================================================





========================활용관련===========================


pyqt 강좌

https://opentutorials.org/module/544


파이썬 3.7.x에 PyQt5 designer 설치

python -m pip install --index-url=http://download.qt.io/snapshots/ci/pyside/5.11/latest pyside2 --trusted-host download.qt.io


=========================================================





========================기타=============================


카카오 신입 코딩 테스트 문제 해설 

http://tech.kakao.com/2017/09/27/kakao-blind-recruitment-round-1/ 1차

http://tech.kakao.com/2017/10/24/kakao-blind-recruitment-round-2/ 2차

http://tech.kakao.com/2017/11/14/kakao-blind-recruitment-round-3/ 3차


파이썬 생존 안내서(듀랑고 개발자)

https://www.slideshare.net/sublee/ss-67589513


========================================================