sparcflow / HackLikeAGhostLinks
☆83Updated 4 years ago
Alternatives and similar repositories for HackLikeAGhost
Users that are interested in HackLikeAGhost are comparing it to the libraries listed below
Sorting:
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆67Updated 2 months ago
- Scripts featured in the book How to Hack Like a Legend☆149Updated 2 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- ☆154Updated 3 weeks ago
- A repo to support the book☆111Updated 4 years ago
- A little utility to convert nmap xml results to markdown tables☆71Updated 3 years ago
- ☆80Updated 6 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- ☆27Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- List of Repositories☆103Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- Protocol agnostic online password guessing API.☆85Updated 2 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆106Updated last year
- Merge multiple nMap xml files into one☆49Updated 6 years ago
- ☆101Updated last year
- ☆48Updated 4 years ago
- ☆54Updated 7 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆36Updated 5 years ago
- ☆118Updated 8 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago