Scripts featured in the book How to Hack Like a Legend
☆150Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for HackLikeALegend
Users that are interested in HackLikeALegend are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆82Apr 22, 2021Updated 4 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆562Jan 3, 2017Updated 9 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- A BOF that's a BOF Loader and more☆201Jan 17, 2026Updated 2 months ago
- ☆20Apr 21, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Azure Offensive Library☆17Oct 18, 2025Updated 5 months ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,528Jul 15, 2019Updated 6 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago
- This code was used for the blogpost on secjuice.☆43Apr 17, 2019Updated 6 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆216Oct 8, 2020Updated 5 years ago
- ☆21Apr 24, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆42Dec 22, 2020Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- Chameleon: A tool for evading Proxy categorisation☆512Nov 28, 2024Updated last year
- SharpUp is a C# port of various PowerUp functionality.☆1,472Feb 14, 2024Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 5 years ago
- ☆119Aug 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,092Feb 25, 2026Updated last month
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- ☆301Jan 3, 2024Updated 2 years ago
- ☆164Dec 30, 2022Updated 3 years ago