sparcflow / HackLikeAGhostLinks
☆79Updated 4 years ago
Alternatives and similar repositories for HackLikeAGhost
Users that are interested in HackLikeAGhost are comparing it to the libraries listed below
Sorting:
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆63Updated 7 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- ☆80Updated 5 years ago
- Scripts featured in the book How to Hack Like a Legend☆147Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- ☆42Updated 4 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- A repo to support the book☆109Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
- List of Repositories☆100Updated 3 years ago
- A little utility to convert nmap xml results to markdown tables☆72Updated 3 years ago
- ☆116Updated 6 months ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- ☆53Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 4 years ago
- PowerShell payload generator☆117Updated 4 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- Posts about different topics☆40Updated last month
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated last week
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- easy-to-use payload hosting☆272Updated 3 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆104Updated last year
- ☆48Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆152Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- ☆117Updated 4 years ago