jhllc / Unity-Game
☆47Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Unity-Game
- notes and ramblings from my OSCP/PenTesting Studies☆67Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆159Updated 8 months ago
- ⚠️ malware development☆457Updated 5 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆209Updated 10 months ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆185Updated 2 years ago
- capNcook - a dark web exploration tool☆79Updated last month
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆250Updated last year
- ☆89Updated last week
- Ansible Scripts to Build Out My Parrot☆184Updated 3 months ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆48Updated last month
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆128Updated 7 months ago
- ☆136Updated 9 months ago
- Official writeups for Hack The Boo CTF 2024☆38Updated 2 weeks ago
- Here are all the notes I personally took while studying for the OSCP which helped me pass.☆74Updated 2 years ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆152Updated last month
- Malware attacks/techniques explained☆94Updated last week
- Projects for security students and professionals☆137Updated 4 months ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆119Updated 2 years ago
- A blind SQL injection brute forcer☆51Updated this week
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆58Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- The Black Hat Bash book repository☆193Updated 2 weeks ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆239Updated this week
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 4 months ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆168Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆234Updated 2 months ago
- Malware Development for Ethical Hackers, published by Packt☆215Updated 3 months ago
- ☆275Updated last week
- Knowledge needed to obtain the OSCP certification☆240Updated 4 months ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆299Updated last year