HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz
☆22Oct 25, 2021Updated 4 years ago
Alternatives and similar repositories for HackTricks-Automatic-Commands
Users that are interested in HackTricks-Automatic-Commands are comparing it to the libraries listed below
Sorting:
- CVE-2021-33766-poc☆11Sep 15, 2021Updated 4 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- ☆25Jul 7, 2022Updated 3 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Un simple reverse shell indétectable (1/65 sur virustotal au 12/02/2022) écrit en C# qui utilise un client socket UDP sur le port 53 (por…☆12Feb 12, 2022Updated 4 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- The Faction Burp Suite Extension☆13Mar 18, 2024Updated 2 years ago
- ☆15Oct 1, 2013Updated 12 years ago
- CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation☆14Apr 25, 2022Updated 3 years ago
- ☆22Jun 9, 2025Updated 9 months ago
- A simple script for bulk-inserting monitors to Uptime Kuma☆22Nov 23, 2023Updated 2 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- GALL.AI (prev. Generall.AI) - Telegram Advanced AI Agent System Chat Bot☆16Mar 3, 2026Updated 2 weeks ago
- ☆25Aug 11, 2020Updated 5 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- UAC Bypass exploit for x64 Windows 10 machines, still not patched.☆17Jun 25, 2020Updated 5 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆126Nov 11, 2024Updated last year
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- The service in the android app detects the potholes using accelerometer and sends it to the server and is fetched back and shown to all u…☆15Jul 25, 2015Updated 10 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Aug 18, 2025Updated 7 months ago
- HTTP Protocol Stack CVE-2021-31166☆13Oct 17, 2024Updated last year
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆160Feb 25, 2023Updated 3 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Utility to check the integrity of your DNS managed zones at your cloud service provider☆15Jan 19, 2022Updated 4 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- ☆31Feb 15, 2016Updated 10 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago