skills/duck4nh/antigravity-kit/python-security-tools

python-security-tools

SKILL.md

Python Security Tools

Essential Libraries

# Web
import requests
from bs4 import BeautifulSoup
from urllib.parse import urljoin, quote

# Network
import socket
from scapy.all import *

# Binary/Exploit
from pwn import *

# Async
import asyncio
import aiohttp

# Utils
import argparse
import concurrent.futures

HTTP Requests

s = requests.Session()
s.verify = False  # Ignore SSL
s.proxies = {"http": "http://127.0.0.1:8080"}  # Burp

# GET with params
r = s.get(url, params={"id": "1"})

# POST with data
r = s.post(url, data={"user": "admin", "pass": "test"})

# POST JSON
r = s.post(url, json={"key": "value"})

# Custom headers
r = s.get(url, headers={"Authorization": "Bearer token"})

# Handle response
print(r.status_code, r.text, r.json())

Socket Programming

# TCP client
import socket

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((HOST, PORT))
s.sendall(b"data\n")
response = s.recv(4096)
s.close()

# UDP
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
s.sendto(b"data", (HOST, PORT))

Multithreading

from concurrent.futures import ThreadPoolExecutor

def scan(target):
    # scan logic
    pass

targets = ["url1", "url2", "url3"]
with ThreadPoolExecutor(max_workers=10) as executor:
    results = executor.map(scan, targets)

Common Patterns

# URL fuzzing
for word in wordlist:
    url = f"{base_url}/{word}"
    r = requests.get(url)
    if r.status_code == 200:
        print(f"[+] Found: {url}")

# Parameter brute
for payload in payloads:
    r = requests.get(url, params={"id": payload})
    if "error" not in r.text:
        print(f"[+] Possible: {payload}")
Weekly Installs
5
GitHub Stars
16
First Seen
Jan 27, 2026
Installed on
opencode3
gemini-cli3
github-copilot3
codex3
cursor3
antigravity2