D3vil0p3r / htb-toolkit
Play Hack The Box directly on your system.
☆42Updated 5 months ago
Alternatives and similar repositories for htb-toolkit:
Users that are interested in htb-toolkit are comparing it to the libraries listed below
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated 11 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆66Updated 11 months ago
- Chrome extension tool for OSINT & Recon☆51Updated 11 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 10 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- Simple username generator based on a list of name and surname☆12Updated 3 years ago
- ☆27Updated 7 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 5 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆15Updated 7 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆57Updated 2 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ☆72Updated 9 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆56Updated 2 weeks ago
- A collection of config files for linux focusing on hackthebox theme☆41Updated 2 months ago
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆31Updated 4 months ago
- Discovering Typo Squatting on your domains!☆64Updated 6 months ago
- IoT Camera Reconnaissance and Live Viewer☆139Updated 6 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 5 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆32Updated this week
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- Red Teaming tools and techniques☆50Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆103Updated 7 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆57Updated last week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 10 months ago
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆82Updated last month
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆65Updated last year