Hacker bootsplash themes just like in the movie!
☆60Jul 28, 2024Updated last year
Alternatives and similar repositories for Hackers-Plymouth
Users that are interested in Hackers-Plymouth are comparing it to the libraries listed below
Sorting:
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago
- Parser for zebra/MRT BGP routes dumps.☆41Nov 7, 2016Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Mar 29, 2019Updated 6 years ago
- Hardened debian linux baseimage for Docker.☆42May 3, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Fancy Themes For Plasma Desktop☆11Dec 11, 2025Updated 2 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Wisp protocol client that exposes the Wisp connection over a TUN device.☆14Dec 24, 2024Updated last year
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- The Hoa\Http library.☆10Apr 2, 2021Updated 4 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- ☆10Feb 13, 2026Updated 3 weeks ago
- ☆11Apr 16, 2025Updated 10 months ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Analyze json logs in realtime☆14Feb 15, 2021Updated 5 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated last year
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A 1014 Byte ELF64/DOS.COM/GameBoy/Megadrive/PDF/ARJ/PKZIP/7zip Polyglot Binary☆13Sep 8, 2022Updated 3 years ago
- Emoji Favicon Toolkit - Set your favicon to emoji using canvas & cache as /favicon.ico with service workers☆16Mar 16, 2019Updated 6 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆65Updated this week
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- code and manual for the defcon shoot 23 badge☆10Aug 10, 2015Updated 10 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago