POWER(SHELL) ALL THE THINGS!
☆38Mar 30, 2026Updated last month
Alternatives and similar repositories for Hacker-Scripts
Users that are interested in Hacker-Scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell hacking☆12Dec 29, 2017Updated 8 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Jul 26, 2024Updated last year
- ☆15Nov 22, 2023Updated 2 years ago
- Powershell script to download the latest 3rd party software☆15Feb 5, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Script spam sms termux☆13Aug 24, 2020Updated 5 years ago
- Termux-api wrapper for python☆16Jul 16, 2018Updated 7 years ago
- Graphical User Interface for Termux☆15Oct 30, 2022Updated 3 years ago
- ☆11Mar 27, 2024Updated 2 years ago
- Deploy Uptime Kuma to Azure app service using bicep☆20Apr 17, 2023Updated 3 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Home Assistant integration for the Homeduino 433 MHz RF transceivers over the serial interface☆15May 10, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Addon to mark / unmark assets in a scene or library☆11Feb 19, 2026Updated 3 months ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 5 months ago
- Attempt to connect to and dump all tables within a ServiceNow instance.☆20Jul 4, 2023Updated 2 years ago
- Email-Recon-For-Linux☆12May 20, 2022Updated 4 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Jun 26, 2014Updated 11 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- one client for all of your favorite clouds, multiple clouds unlimited accounts (Multicloud Manager)☆12May 2, 2020Updated 6 years ago
- 🛸 Ping websites at regular intervals using just GitHub Actions!☆17Sep 13, 2023Updated 2 years ago
- ☆10May 8, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Amazon-Aged-Account-Gen☆10Apr 7, 2023Updated 3 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- sample code to perform aave flashloan with OrFeed https://docs.aave.com/developers/tutorials/performing-a-flash-loan☆10Jan 24, 2023Updated 3 years ago
- ☆56Mar 13, 2026Updated 2 months ago
- ☆14Nov 16, 2025Updated 6 months ago
- An android app that sends phone location details via sms and to the web. A hack for MFA mobile workshop☆14Jul 24, 2009Updated 16 years ago
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 4 years ago
- ☆17Mar 18, 2024Updated 2 years ago
- QMG versions of Nethunter boot animations.☆17Jan 17, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- How to Hack an Android Phone using an Malicious Android Application (Part-1)☆13Oct 8, 2021Updated 4 years ago
- Python library to converts a line graph to sound and return an object that can be played in Jupyter notebook or Google Colab. Values are …☆12Apr 24, 2021Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Nov 1, 2018Updated 7 years ago
- Vigilante.pw - The Breached Database Directory (BACKUP)☆21Jun 2, 2020Updated 5 years ago
- Moorebot Scout programs☆10Mar 9, 2022Updated 4 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Kanban support for Obsidian bases☆57Mar 9, 2026Updated 2 months ago