π An up-to-date collection of precompiled binaries and hacking scripts.
β47Feb 1, 2026Updated last month
Alternatives and similar repositories for Hackpack
Users that are interested in Hackpack are comparing it to the libraries listed below
Sorting:
- an Improoved Version of 0xNinjaCycloneΒ΄s EarlyCascade Codeβ22Feb 20, 2025Updated last year
- A simple web viewer for TruffleHog JSON output.β19Jan 7, 2026Updated last month
- Invoke-SPSI - Simple PowerShell Shellcode Injectorβ37Oct 9, 2025Updated 4 months ago
- β16Jun 15, 2025Updated 8 months ago
- β12Oct 15, 2024Updated last year
- Red Team Coin for crypto-mining operations.β23Jan 12, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287β46Oct 28, 2025Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β36Oct 1, 2025Updated 5 months ago
- POC of GITHUB simple C2 in rustβ52Jul 27, 2025Updated 7 months ago
- β15Jan 26, 2023Updated 3 years ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β195Feb 6, 2025Updated last year
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ93Nov 13, 2025Updated 3 months ago
- An introduction to detection engineeringβ14Jan 3, 2025Updated last year
- Automatic, fast parsing of browser artifactsβ17Jan 4, 2025Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.β149Jun 5, 2025Updated 8 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)β18Jun 6, 2025Updated 8 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.β109Feb 16, 2026Updated 2 weeks ago
- Windows Access token manipulation tool made in C#β24Aug 24, 2025Updated 6 months ago
- Adversary Simulation Frameworkβ38Aug 19, 2025Updated 6 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to eaβ¦β23Jan 21, 2024Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CEβ26Dec 20, 2025Updated 2 months ago
- Diaphora Machine Learning tools and datasetsβ23Sep 23, 2024Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accountsβ18Apr 19, 2024Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.β166Jul 30, 2025Updated 7 months ago
- A python script that automates a C2 Profile buildβ48Dec 14, 2025Updated 2 months ago
- Covert data exfiltration via DNSβ51Feb 8, 2025Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β215Oct 19, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.β22Jan 5, 2025Updated last year
- Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)β87Jan 14, 2025Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloβ¦β219Oct 28, 2025Updated 4 months ago
- Automated Evilginx phishlet creator Extension for Burpsuiteβ63Jan 10, 2025Updated last year
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data andβ¦β153Feb 2, 2026Updated 3 weeks ago
- Cerberos Is A Tool Wich Has Over 50+ Functions. Cerberos Uses Discord as C2.β17Jan 7, 2023Updated 3 years ago
- Smuggle a file to a user's browserβ20Apr 16, 2022Updated 3 years ago
- This is a collection of Worms for educational purposesβ34Jul 17, 2025Updated 7 months ago
- Tool for enumerating Active Directory environmentsβ48Aug 10, 2023Updated 2 years ago
- C2 writen in Rust & Go powered by Tor network.β152Oct 30, 2025Updated 4 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policyβ167Nov 17, 2025Updated 3 months ago
- A quick reference script that can easily display reverse shells for different languages.β20May 28, 2020Updated 5 years ago