milosilo / hack_hardLinks
A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
☆29Updated last year
Alternatives and similar repositories for hack_hard
Users that are interested in hack_hard are comparing it to the libraries listed below
Sorting:
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- ☆32Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Legba recipes.☆50Updated 9 months ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 2 months ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- ☆34Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- ☆22Updated 4 years ago
- Sniffing out well-known threat groups☆28Updated 9 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆20Updated 2 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated last year