LucasParsy / haccksLinks
Hacker Animation Cool Console Kryptographic Sequencer (haccks)
☆14Updated last year
Alternatives and similar repositories for haccks
Users that are interested in haccks are comparing it to the libraries listed below
Sorting:
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- rcat☆70Updated 3 years ago
- ☆61Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Updated 2 weeks ago
- Python code to Serialize and Unserialize java binary serialization format.☆26Updated 3 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 3 months ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- ☆97Updated 8 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- ☆92Updated 9 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆80Updated 7 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆91Updated last week
- ☆54Updated 8 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆25Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆94Updated 2 months ago
- ☆38Updated 3 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆112Updated 2 months ago
- My Personal Notes of OSEP☆38Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 2 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Custom queries list for BloodHound☆30Updated 3 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 10 months ago