☆2,175Oct 22, 2024Updated last year
Alternatives and similar repositories for red-python-scripts
Users that are interested in red-python-scripts are comparing it to the libraries listed below
Sorting:
- ☆157Jun 22, 2023Updated 2 years ago
- ☆198Nov 28, 2020Updated 5 years ago
- ☆327May 13, 2022Updated 3 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆134Oct 27, 2020Updated 5 years ago
- Code examples for David Bombal's Python Videos☆454Jan 8, 2022Updated 4 years ago
- hak5 YouTube videos☆515Aug 9, 2022Updated 3 years ago
- ☆305Feb 28, 2022Updated 4 years ago
- ☆779Aug 17, 2022Updated 3 years ago
- ☆37Jun 12, 2017Updated 8 years ago
- ☆41Jun 12, 2017Updated 8 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆221Dec 9, 2022Updated 3 years ago
- ☆208Aug 3, 2022Updated 3 years ago
- ☆176May 22, 2023Updated 2 years ago
- ☆258Sep 7, 2021Updated 4 years ago
- ☆19Jul 16, 2023Updated 2 years ago
- Information gathering framework for phone numbers☆16,023Jan 6, 2026Updated 2 months ago
- ☆1,990Jun 25, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,864Oct 12, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,484Updated this week
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,435Aug 25, 2025Updated 6 months ago
- The LAZY script will make your life easier, and of course faster.☆4,314Aug 28, 2021Updated 4 years ago
- Hunt down social media accounts by username across social networks☆73,755Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,353May 21, 2025Updated 9 months ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,445Mar 2, 2026Updated 2 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,434Jan 19, 2025Updated last year
- Reverse Engineer's Toolkit☆5,175May 1, 2025Updated 10 months ago
- The Official USB Rubber Ducky Payload Repository☆5,599Mar 7, 2026Updated last week
- Understand the nature of malicious software with practical examples in Python.☆2,219Dec 19, 2023Updated 2 years ago
- Accurately Locate Smartphones using Social Engineering☆9,152May 7, 2025Updated 10 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,539Updated this week
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆11,923Aug 8, 2024Updated last year
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,154Updated this week
- The all-in-one browser extension for offensive security professionals 🛠☆6,651Jan 5, 2025Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,028Feb 12, 2023Updated 3 years ago
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,610Apr 29, 2025Updated 10 months ago
- Codebase to generate an msdt-follina payload☆1,633Jun 8, 2022Updated 3 years ago
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆4,583Oct 10, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week