Play Hack The Box directly on your system.
☆56Feb 1, 2026Updated last month
Alternatives and similar repositories for htb-toolkit
Users that are interested in htb-toolkit are comparing it to the libraries listed below
Sorting:
- ☆27May 6, 2025Updated 10 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- ☆13Aug 1, 2023Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 10 months ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- ☆11May 25, 2021Updated 4 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 6 months ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to ge…☆33Oct 18, 2023Updated 2 years ago
- ☆14Mar 20, 2025Updated 11 months ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A collection of Windows scripts I've found useful☆14Mar 1, 2026Updated last week
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last week
- Recon Automation☆11Sep 14, 2024Updated last year
- CATANA - CUT your Wordlist!☆16Oct 2, 2022Updated 3 years ago
- This tool helps you to hack android device front camera☆18Sep 27, 2023Updated 2 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆34Sep 19, 2023Updated 2 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Go API Client for Metasploit RPC API☆18May 23, 2025Updated 9 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- ☆11Dec 18, 2023Updated 2 years ago
- Hackthebox tools☆12Mar 3, 2019Updated 7 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆22Updated this week
- ☆25Aug 19, 2024Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Espaço dedicado a discussões e tira dúvida sobre disciplinas e conteúdo tecnológico.☆11Jan 8, 2018Updated 8 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- Bug Bounty statistics tool.☆33Nov 17, 2022Updated 3 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago