LucasParsy / haccksLinks
Hacker Animation Cool Console Kryptographic Sequencer (haccks)
☆15Updated last year
Alternatives and similar repositories for haccks
Users that are interested in haccks are comparing it to the libraries listed below
Sorting:
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Updated last month
- rcat☆75Updated 3 years ago
- ☆63Updated 2 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆80Updated 2 years ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- ☆39Updated 4 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆82Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆26Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- CLI monitor for windows process- & file activity☆97Updated 5 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆104Updated 2 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆47Updated 6 months ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆166Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆77Updated last year
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- ☆54Updated last year
- ☆49Updated 4 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆29Updated 3 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Updated 11 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year