#HackingTogether
☆14Jan 23, 2017Updated 9 years ago
Alternatives and similar repositories for hackingtogether
Users that are interested in hackingtogether are comparing it to the libraries listed below
Sorting:
- A GUI for the Ducky Encoder☆22Mar 9, 2019Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- A collection of darkc0de old scripts (for education purposes only)☆87May 11, 2016Updated 9 years ago
- an app to find tech for good events near you☆11Jan 9, 2018Updated 8 years ago
- ☆14Jul 30, 2020Updated 5 years ago
- Java Springboot app using Azure AD MFA authentication☆10May 3, 2017Updated 8 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- lulz: automated webstalking tool☆54Jun 3, 2016Updated 9 years ago
- An experiment in permeable publishing.☆11Jan 17, 2017Updated 9 years ago
- ☆18Feb 12, 2026Updated 3 weeks ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- ramcache implements an in-memory key/value cache with expirations based on access and insertion times.☆13Aug 7, 2018Updated 7 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Send HTTP scrapers to Wonderland☆24Jan 7, 2019Updated 7 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 8 years ago
- Integrate "contact-us" functionality on single-page and static websites☆11Jan 12, 2018Updated 8 years ago
- A Security Analysis of Honeywords☆16Nov 28, 2017Updated 8 years ago
- An Introduction to Optimization Algorithms☆11Dec 26, 2020Updated 5 years ago
- Custom reimplementation of LogManager service, redirecting logs to SD card☆10Apr 27, 2020Updated 5 years ago
- Gem in a Box, secured and audited.☆10Jan 4, 2018Updated 8 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Proving ground for changes to attohttpc☆12Jun 16, 2025Updated 8 months ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Wireshark regression tests☆11Jan 21, 2021Updated 5 years ago
- a minimal, Rust-based coding agent focused at CI workflows and small codemods, similar to Claude Code☆35Jan 30, 2026Updated last month
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- Run fabric scripts. Run them in parallel. Store results for later.☆16Oct 9, 2014Updated 11 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- A lightweight web application firewall module for nginx, which is already used in the production environment.☆14Mar 20, 2014Updated 11 years ago