☆2,177Oct 22, 2024Updated last year
Alternatives and similar repositories for red-python-scripts
Users that are interested in red-python-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆158Jun 22, 2023Updated 2 years ago
- ☆199Nov 28, 2020Updated 5 years ago
- ☆326May 13, 2022Updated 3 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆134Oct 27, 2020Updated 5 years ago
- Code examples for David Bombal's Python Videos☆456Jan 8, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- hak5 YouTube videos☆515Aug 9, 2022Updated 3 years ago
- ☆305Feb 28, 2022Updated 4 years ago
- ☆779Aug 17, 2022Updated 3 years ago
- ☆37Jun 12, 2017Updated 8 years ago
- ☆41Jun 12, 2017Updated 8 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆220Dec 9, 2022Updated 3 years ago
- ☆207Aug 3, 2022Updated 3 years ago
- ☆177May 22, 2023Updated 2 years ago
- ☆258Sep 7, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆19Jul 16, 2023Updated 2 years ago
- Information gathering framework for phone numbers☆16,170Jan 6, 2026Updated 3 months ago
- ☆1,998Jun 25, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,881Oct 12, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,573Aug 25, 2025Updated 7 months ago
- The LAZY script will make your life easier, and of course faster.☆4,319Aug 28, 2021Updated 4 years ago
- Hunt down social media accounts by username across social networks☆79,713Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,367May 21, 2025Updated 10 months ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,463Apr 2, 2026Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,436Jan 19, 2025Updated last year
- Reverse Engineer's Toolkit☆5,175May 1, 2025Updated 11 months ago
- The Official USB Rubber Ducky Payload Repository☆5,628Mar 20, 2026Updated 2 weeks ago
- Accurately Locate Smartphones using Social Engineering☆9,218May 7, 2025Updated 11 months ago
- Understand the nature of malicious software with practical examples in Python.☆2,227Dec 19, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆11,958Aug 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,175Mar 18, 2026Updated 3 weeks ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,669Jan 5, 2025Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,040Feb 12, 2023Updated 3 years ago
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,652Apr 29, 2025Updated 11 months ago
- Codebase to generate an msdt-follina payload☆1,631Jun 8, 2022Updated 3 years ago
- ☆14Oct 23, 2017Updated 8 years ago
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆4,594Oct 10, 2023Updated 2 years ago