yogithesymbian / bug-hunting-penetration-rgb-hatView external linksLinks
Bug Hunting Penetration RGB Hat are red, gray, and black hat
☆19Jan 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for bug-hunting-penetration-rgb-hat
Users that are interested in bug-hunting-penetration-rgb-hat are comparing it to the libraries listed below
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Scripts Python for hacking☆14Dec 24, 2024Updated last year
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 4 years ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆71Aug 11, 2019Updated 6 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- Simple Penetration Testing Multitool For Beginners.☆60Dec 8, 2022Updated 3 years ago
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆56Jan 10, 2026Updated last month
- ☆31May 22, 2024Updated last year
- Writeups on my TryHackMe adventures!☆58Oct 5, 2023Updated 2 years ago
- Fake-sms☆27Jun 21, 2025Updated 7 months ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- xorhunx adalah tool cryptography☆11Jun 21, 2023Updated 2 years ago
- Keylogger em Python☆49Jul 10, 2023Updated 2 years ago
- BAIT LINUX Sofware Linux Dirtibution On Android Termux☆16Nov 15, 2021Updated 4 years ago
- Maltego DarkNET Transforms - These are all PHP local transforms that i am trying to maintain and deploy in a easy way! The name may lead …☆17Oct 21, 2018Updated 7 years ago
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- A collection of tools for modding Android applications.☆15Nov 1, 2019Updated 6 years ago
- This is a RealTek RTL8188eus WiFi driver that supports monitor mode and frame injection, enabling better performance and functionality.☆17Nov 4, 2022Updated 3 years ago
- Information Gathering Simplified.☆75Jan 17, 2023Updated 3 years ago
- To hack Instagram account☆10Aug 25, 2020Updated 5 years ago
- "Kali replacer." It has a large number of hacking tools.☆39Mar 31, 2020Updated 5 years ago
- Small snippets and scripts which I use☆35Sep 17, 2020Updated 5 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆66Nov 28, 2019Updated 6 years ago
- Grab cam shots from target's phone front camera or PC webcam just sending a link. Author will not be responsible for any misuse of this t…☆137Jul 1, 2025Updated 7 months ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆31Jan 18, 2022Updated 4 years ago
- ☆34May 1, 2019Updated 6 years ago
- ☆32Oct 5, 2016Updated 9 years ago
- Automated WIFI Hacking Tool☆234Nov 16, 2020Updated 5 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago
- # hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have …☆11May 9, 2021Updated 4 years ago
- Odds and Ends, Node that helped myself along the way☆14May 12, 2020Updated 5 years ago
- Python-Based Pentesting Framework☆31Dec 7, 2022Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- DDRS4PALS - A software for the acquisition and simulation of positron lifetime spectra (PALS) using the DRS4 evaluation board.☆12Aug 29, 2022Updated 3 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago