☆2,179Oct 22, 2024Updated last year
Alternatives and similar repositories for red-python-scripts
Users that are interested in red-python-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆160Jun 22, 2023Updated 2 years ago
- ☆199Nov 28, 2020Updated 5 years ago
- ☆326May 13, 2022Updated 4 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆134Oct 27, 2020Updated 5 years ago
- Code examples for David Bombal's Python Videos☆452Jan 8, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- hak5 YouTube videos☆517Aug 9, 2022Updated 3 years ago
- ☆309Feb 28, 2022Updated 4 years ago
- ☆781Aug 17, 2022Updated 3 years ago
- ☆37Jun 12, 2017Updated 8 years ago
- ☆41Jun 12, 2017Updated 8 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆220Dec 9, 2022Updated 3 years ago
- ☆207Aug 3, 2022Updated 3 years ago
- ☆256Sep 7, 2021Updated 4 years ago
- ☆19Jul 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Information gathering framework for phone numbers☆16,430Jan 6, 2026Updated 4 months ago
- ☆1,995Jun 25, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated 3 weeks ago
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,928Oct 12, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,848Updated this week
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,824Aug 25, 2025Updated 8 months ago
- The LAZY script will make your life easier, and of course faster.☆4,319Aug 28, 2021Updated 4 years ago
- Hunt down social media accounts by username across social networks☆83,419Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,383May 21, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An open-source post-exploitation framework for students, researchers and developers.☆9,473May 9, 2026Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,457Jan 19, 2025Updated last year
- Reverse Engineer's Toolkit☆5,199Updated this week
- The Official USB Rubber Ducky Payload Repository☆5,730May 9, 2026Updated last week
- Understand the nature of malicious software with practical examples in Python.☆2,234Dec 19, 2023Updated 2 years ago
- Accurately Locate Smartphones using Social Engineering☆9,470May 7, 2025Updated last year
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆12,059Aug 8, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,971Updated this week
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,208Mar 18, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The all-in-one browser extension for offensive security professionals 🛠☆6,717Jan 5, 2025Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,064Feb 12, 2023Updated 3 years ago
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,744Apr 29, 2025Updated last year
- Codebase to generate an msdt-follina payload☆1,633Jun 8, 2022Updated 3 years ago
- ☆14Oct 23, 2017Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,710May 12, 2026Updated last week
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆4,664Oct 10, 2023Updated 2 years ago