☆2,179Oct 22, 2024Updated last year
Alternatives and similar repositories for red-python-scripts
Users that are interested in red-python-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆159Jun 22, 2023Updated 2 years ago
- ☆199Nov 28, 2020Updated 5 years ago
- ☆326May 13, 2022Updated 3 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆134Oct 27, 2020Updated 5 years ago
- Code examples for David Bombal's Python Videos☆452Jan 8, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- hak5 YouTube videos☆517Aug 9, 2022Updated 3 years ago
- ☆308Feb 28, 2022Updated 4 years ago
- ☆780Aug 17, 2022Updated 3 years ago
- ☆37Jun 12, 2017Updated 8 years ago
- ☆41Jun 12, 2017Updated 8 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆219Dec 9, 2022Updated 3 years ago
- ☆206Aug 3, 2022Updated 3 years ago
- ☆256Sep 7, 2021Updated 4 years ago
- ☆19Jul 16, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Information gathering framework for phone numbers☆16,301Jan 6, 2026Updated 3 months ago
- ☆1,998Jun 25, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,901Oct 12, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆12,698Aug 25, 2025Updated 8 months ago
- The LAZY script will make your life easier, and of course faster.☆4,322Aug 28, 2021Updated 4 years ago
- Hunt down social media accounts by username across social networks☆82,092Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,372May 21, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An open-source post-exploitation framework for students, researchers and developers.☆9,461Apr 2, 2026Updated 3 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,451Jan 19, 2025Updated last year
- Reverse Engineer's Toolkit☆5,189May 1, 2025Updated 11 months ago
- The Official USB Rubber Ducky Payload Repository☆5,688Apr 10, 2026Updated 2 weeks ago
- Accurately Locate Smartphones using Social Engineering☆9,308May 7, 2025Updated 11 months ago
- Understand the nature of malicious software with practical examples in Python.☆2,231Dec 19, 2023Updated 2 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆12,004Aug 8, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,522Updated this week
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,192Mar 18, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The all-in-one browser extension for offensive security professionals 🛠☆6,698Jan 5, 2025Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,050Feb 12, 2023Updated 3 years ago
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,700Apr 29, 2025Updated last year
- Codebase to generate an msdt-follina payload☆1,634Jun 8, 2022Updated 3 years ago
- ☆14Oct 23, 2017Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,671Updated this week
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆4,615Oct 10, 2023Updated 2 years ago