BitsByWill / HacktheBox-WriteupsLinks
Some of my flag protected writeups
☆11Updated 5 years ago
Alternatives and similar repositories for HacktheBox-Writeups
Users that are interested in HacktheBox-Writeups are comparing it to the libraries listed below
Sorting:
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- NTLMRelay for MS Exchange☆11Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ☆36Updated 6 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Noob Penetration tester☆11Updated last year
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Re-implementation of VirtueSecurity's benigncertain-monitor☆11Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- CVE-2020-0688 PoC☆11Updated 6 months ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- ☆1Updated 6 years ago
- ☆17Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Work in Progress repo☆14Updated 6 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago