Useful scripts to exploit Hack The Box retired machines/challenges
☆61Feb 26, 2026Updated last week
Alternatives and similar repositories for HackTheBox-scripts
Users that are interested in HackTheBox-scripts are comparing it to the libraries listed below
Sorting:
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- ☆17Apr 9, 2024Updated last year
- Space Heroes CTF was an online jeopardy style Capture the Flag competition that our FITSEC Team From Florida Tech host April 1st-April 3r…☆14Apr 5, 2022Updated 3 years ago
- AD related packs are here!☆15Feb 16, 2023Updated 3 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- Collection of templates for linux☆10Jun 2, 2024Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Sep 28, 2022Updated 3 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- Collection of random scripts that make my life in the Linux console way simpler☆43Oct 17, 2025Updated 4 months ago
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- In this Case Study I'm performing Exploratory Analysis & Building a model which will Classify if Patient has CHD or Not.☆14Jul 31, 2019Updated 6 years ago
- A collection of my adventures through hackthebox.eu☆38Apr 25, 2021Updated 4 years ago
- Helpful files to get started working on a new Jekyll website☆30Dec 16, 2018Updated 7 years ago
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 7 months ago
- 一款可以高度自定义的 API 信息收集与记录 Burp扩展套件☆11Dec 1, 2024Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Mission Landing Zone for Edge Technologies☆14Oct 9, 2023Updated 2 years ago
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 4 months ago
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago
- A C# PE loader for x64 and x86 PE files.☆47Feb 24, 2026Updated last week
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Cyber-Physical Systems Guide☆15Jul 25, 2021Updated 4 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆17May 27, 2025Updated 9 months ago
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆14Sep 14, 2021Updated 4 years ago
- ☆15Sep 2, 2024Updated last year
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- A simple Speech-to-Text (STT) / Text-to-Speech (TTS) wrapper for LLMs☆11Oct 22, 2024Updated last year
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Intelligent token optimization for Claude Code - achieving 95%+ token reduction through caching, compression, and smart tool intelligence☆24Feb 14, 2026Updated 3 weeks ago
- WEB BASED PHP WEBSITE THAT LINKS WITH ZKTECO TIME ATTENDANCE SOFTWARE TO SEND MESSAGES TO PHONE NUMBERS WITH APPROPRIATE TIMESTAMPS☆12May 16, 2019Updated 6 years ago