davidbombal / red-python-scriptsLinks
☆2,170Updated last year
Alternatives and similar repositories for red-python-scripts
Users that are interested in red-python-scripts are comparing it to the libraries listed below
Sorting:
- ☆774Updated 3 years ago
- ☆325Updated 3 years ago
- hak5 YouTube videos☆513Updated 3 years ago
- ☆196Updated 5 years ago
- ☆303Updated 3 years ago
- ☆157Updated 2 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆132Updated 5 years ago
- ☆206Updated 3 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆223Updated 3 years ago
- ☆37Updated 8 years ago
- ☆1,978Updated 2 years ago
- Use Android as Rubber Ducky against another Android device☆1,620Updated 2 years ago
- Understand the nature of malicious software with practical examples in Python.☆2,198Updated 2 years ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,260Updated 3 months ago
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,093Updated 3 weeks ago
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,493Updated 9 months ago
- Get All Registered Wifi Passwords from Target Computer.☆694Updated 2 years ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,679Updated last year
- ☆22Updated 6 years ago
- Malware programs written in python, reference from PatrikH0lop/malware_showcase☆54Updated 3 years ago
- A Modular Penetration Testing Framework☆1,665Updated 2 weeks ago
- Hacking Books☆21Updated 2 years ago
- Hacking tools pack & backdoors generator.☆1,975Updated 11 months ago
- A collection of useful Python hacking scripts for beginners☆615Updated 4 years ago
- ☆257Updated 4 years ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆2,998Updated 4 months ago
- Crack Interface lockscreen, Metasploit and More Android/IOS Hacking☆2,816Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆1,965Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,197Updated last year
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆624Updated 11 months ago