☆24Feb 7, 2025Updated last year
Alternatives and similar repositories for hpc-offensive-security
Users that are interested in hpc-offensive-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jan 11, 2023Updated 3 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- My Favorite Offensive Security Scripts☆88Apr 25, 2025Updated 11 months ago
- A VERY DANGEROUS PHISHING TOOL FOR LINUX USER☆14Aug 2, 2020Updated 5 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 weeks ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆31Mar 8, 2026Updated 3 weeks ago
- ☆15Apr 4, 2022Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆51May 13, 2023Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆107Jun 24, 2024Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆112Mar 7, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Portable & Custmizable Windows Defender☆13Nov 10, 2021Updated 4 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆95Dec 2, 2025Updated 3 months ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Some notes written during my OSCP Journey (KeepNote project)☆11Mar 2, 2020Updated 6 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- ☆52Oct 10, 2025Updated 5 months ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆78Dec 7, 2025Updated 3 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A tool to deploy on demand Gitlab CI/CD runners using the custom executor.☆13Oct 25, 2022Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Feb 8, 2021Updated 5 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Exercises from "Learn Python 3 the Hard Way" book by Zed Shaw☆20Jul 29, 2025Updated 8 months ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago