A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
☆32Sep 2, 2023Updated 2 years ago
Alternatives and similar repositories for hack_hard
Users that are interested in hack_hard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Chakra Type Confusions - PoCs of Edge's legacy JS engine vulnerabilities that inject code into the JIT process☆16Mar 26, 2024Updated 2 years ago
- Scan any HackerOne program with Nuclei☆14Sep 21, 2021Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- game of active directory (SnapLabs version)☆17Aug 12, 2025Updated 8 months ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourc…☆17May 31, 2025Updated 10 months ago
- Shell scripts☆13Nov 10, 2020Updated 5 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆23Feb 9, 2018Updated 8 years ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- Block abused TLDs in Tenant Allow BlockList☆15Jan 21, 2026Updated 3 months ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 6 years ago
- This module is used to deploy subnet with network security group and route table associated as workaround to the azurerm_subnet resource …☆12Jan 25, 2026Updated 3 months ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆57Oct 25, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆23Nov 29, 2023Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆64Apr 4, 2026Updated 3 weeks ago
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 10 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- Bicep landing zone vending module for Azure + Azure IPAM example☆17Apr 4, 2023Updated 3 years ago
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Penetration Testing Checklist☆36May 14, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Go dbus API bindings for the Internet wireless Daemon "iwd"☆16Aug 11, 2022Updated 3 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Search public IP owner through ARIN☆61May 23, 2025Updated 11 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- All checklists☆27Mar 26, 2019Updated 7 years ago
- A crowd sourced list of phishing training simulators and their signatures☆19May 23, 2024Updated last year