A git submodule list containing all the tools repo's you'll ever need.
☆27May 22, 2019Updated 6 years ago
Alternatives and similar repositories for hackbox-pro
Users that are interested in hackbox-pro are comparing it to the libraries listed below
Sorting:
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- A badass grabbing tool for getting PDF's of books.☆26Aug 23, 2018Updated 7 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆86Apr 3, 2020Updated 5 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Urls status code & content length checker☆146Oct 1, 2020Updated 5 years ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Disabling PowerShell v2 with Group Policy☆15Mar 11, 2022Updated 4 years ago
- PowerView menu for Cobalt Strike☆70Mar 22, 2018Updated 7 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 4 months ago
- ☆37Jun 7, 2019Updated 6 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Nov 25, 2019Updated 6 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago