Recipes, instructions, ideas related to Hacker BBQ, Hacker Kitchen, and Hacker Baking
☆56Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for HackersKitchen
Users that are interested in HackersKitchen are comparing it to the libraries listed below
Sorting:
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 7 months ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆13Mar 7, 2025Updated last year
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13May 6, 2022Updated 3 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- DNS Roaming is a free and Open Source Client and Service to ensure the DNS Servers are set via a rule / policy rather than the network a …☆17Jan 8, 2024Updated 2 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Jan 26, 2023Updated 3 years ago
- Common Continuous Integration Team Scenarios: Text Version☆11Aug 9, 2020Updated 5 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 7 months ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- A TypeScript utility for ServiceNow developers using VS Code☆14Feb 2, 2026Updated last month
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- A Chat Application In Pure Python with 256-Bit AES Encryption.☆15Oct 4, 2020Updated 5 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- ☆29Aug 9, 2016Updated 9 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- Learn you a book for some infosec good☆62Dec 5, 2019Updated 6 years ago
- Random source codes☆26Dec 22, 2025Updated 2 months ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Repo for EvolveSec Meetup presentations☆11Mar 26, 2019Updated 6 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- Convert CIS pdf benchmarks to Excel and Json☆23Mar 21, 2024Updated 2 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- ☆16Mar 31, 2017Updated 8 years ago