A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
☆32Sep 2, 2023Updated 2 years ago
Alternatives and similar repositories for hack_hard
Users that are interested in hack_hard are comparing it to the libraries listed below
Sorting:
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Scan any HackerOne program with Nuclei☆14Sep 21, 2021Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Plymouth themes taken from Hackers (1995)☆11Oct 7, 2018Updated 7 years ago
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 7 months ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Shell scripts☆13Nov 10, 2020Updated 5 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Block abused TLDs in Tenant Allow BlockList☆14Jan 21, 2026Updated last month
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- This module is used to deploy subnet with network security group and route table associated as workaround to the azurerm_subnet resource …☆12Jan 25, 2026Updated last month
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- Generate an RSS feed for Patreon posts☆12Jan 21, 2024Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- My dotfiles☆19Dec 18, 2024Updated last year
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- Herd Works product feedback issue tracker. Product enhancements, feature requests, and bug reports are welcome and appreciated! Select "I…☆11Feb 17, 2023Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 9 years ago
- (l)user friendly WinDBG theme.☆20Mar 16, 2019Updated 7 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Bicep landing zone vending module for Azure + Azure IPAM example☆17Apr 4, 2023Updated 2 years ago
- Collection of steganography tools for images and text☆42Nov 15, 2023Updated 2 years ago
- NTP Exfiltration Tool☆149Nov 14, 2023Updated 2 years ago
- QR Code + mnemonic + encrypted?☆18Oct 1, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago