Bug Hunting Penetration RGB Hat are red, gray, and black hat
☆19Jan 21, 2026Updated 3 months ago
Alternatives and similar repositories for bug-hunting-penetration-rgb-hat
Users that are interested in bug-hunting-penetration-rgb-hat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 5 years ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- Simple Penetration Testing Multitool For Beginners.☆60Dec 8, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆31May 22, 2024Updated last year
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆69Jan 10, 2026Updated 3 months ago
- Writeups on my TryHackMe adventures!☆57Oct 5, 2023Updated 2 years ago
- Personal version of tools from Black Hat Python☆40Dec 23, 2021Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Collection of Python Scripts☆187Nov 12, 2024Updated last year
- This is a RealTek RTL8188eus WiFi driver that supports monitor mode and frame injection, enabling better performance and functionality.☆17Nov 4, 2022Updated 3 years ago
- "Kali replacer." It has a large number of hacking tools.☆42Mar 31, 2020Updated 6 years ago
- To hack Instagram account☆10Aug 25, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ITWSV- Integrated Tool for Web Security Vulnerability☆67Nov 28, 2019Updated 6 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- 📱 Detect the user mobile phone (Android or iOS) based on their device's OS☆11Nov 25, 2022Updated 3 years ago
- Maltego DarkNET Transforms - These are all PHP local transforms that i am trying to maintain and deploy in a easy way! The name may lead …☆17Oct 21, 2018Updated 7 years ago
- Modular C2 server to tame your pack of wolves☆27Mar 14, 2026Updated last month
- ios hacking tool☆10Mar 24, 2021Updated 5 years ago
- Automated WIFI Hacking Tool☆244Nov 16, 2020Updated 5 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆32Jan 18, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- Fresh and Ape-y NFT Template☆16May 10, 2024Updated last year
- HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION☆39Sep 25, 2018Updated 7 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆144Oct 28, 2025Updated 6 months ago
- Quikkly's Smart Scannable Codes for iOS☆19Jul 16, 2023Updated 2 years ago
- Kill app if it is running under a cloned environment in Android device.☆16Jul 22, 2020Updated 5 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- Odds and Ends, Node that helped myself along the way☆14May 12, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple Web IDE made for Pythonista☆10Feb 15, 2016Updated 10 years ago
- Library tablib to NodeJS☆11Oct 31, 2017Updated 8 years ago
- Simple Admin Finder☆11Apr 25, 2023Updated 3 years ago
- Red Team scripts written in python☆17Jul 24, 2022Updated 3 years ago
- Instagram Automation Tools 2019 (v1.0.2)☆16Feb 4, 2019Updated 7 years ago
- Black-Tool for Termux!☆110Jan 1, 2024Updated 2 years ago
- Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.☆54Oct 23, 2021Updated 4 years ago