☆2,175Oct 22, 2024Updated last year
Alternatives and similar repositories for red-python-scripts
Users that are interested in red-python-scripts are comparing it to the libraries listed below
Sorting:
- ☆158Jun 22, 2023Updated 2 years ago
- ☆197Nov 28, 2020Updated 5 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆133Oct 27, 2020Updated 5 years ago
- Code examples for David Bombal's Python Videos☆454Jan 8, 2022Updated 4 years ago
- hak5 YouTube videos☆515Aug 9, 2022Updated 3 years ago
- ☆304Feb 28, 2022Updated 3 years ago
- ☆778Aug 17, 2022Updated 3 years ago
- ☆37Jun 12, 2017Updated 8 years ago
- ☆41Jun 12, 2017Updated 8 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆223Dec 9, 2022Updated 3 years ago
- ☆208Aug 3, 2022Updated 3 years ago
- ☆258Sep 7, 2021Updated 4 years ago
- ☆19Jul 16, 2023Updated 2 years ago
- Information gathering framework for phone numbers☆15,906Jan 6, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated last week
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,818Oct 12, 2024Updated last year
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,324Aug 25, 2025Updated 6 months ago
- ☆1,981Jun 25, 2023Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,340Feb 14, 2026Updated 2 weeks ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,342May 21, 2025Updated 9 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,421Jan 19, 2025Updated last year
- The LAZY script will make your life easier, and of course faster.☆4,310Aug 28, 2021Updated 4 years ago
- Hunt down social media accounts by username across social networks☆73,118Updated this week
- Accurately Locate Smartphones using Social Engineering☆9,094May 7, 2025Updated 9 months ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆11,886Aug 8, 2024Updated last year
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,566Apr 29, 2025Updated 10 months ago
- Reverse Engineer's Toolkit☆5,169May 1, 2025Updated 9 months ago
- The Official USB Rubber Ducky Payload Repository☆5,547Feb 1, 2026Updated 3 weeks ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,431Feb 20, 2026Updated last week
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,014Feb 12, 2023Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,062Updated this week
- Understand the nature of malicious software with practical examples in Python.☆2,205Dec 19, 2023Updated 2 years ago
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆4,572Oct 10, 2023Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,633Jan 5, 2025Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,043Mar 17, 2024Updated last year
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,447Aug 21, 2024Updated last year
- ALL IN ONE Hacking Tool For Hackers☆55,041Oct 14, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,472Feb 19, 2026Updated last week
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,694Apr 20, 2024Updated last year