D3vil0p3r / htb-toolkit
Play Hack The Box directly on your system.
☆38Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for htb-toolkit
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆38Updated 2 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 4 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Crawls URL to get a better image of what is tied to a website.☆32Updated last year
- Chrome extension tool for OSINT & Recon☆50Updated 8 months ago
- Red Teaming tools and techniques☆47Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆64Updated 8 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated last year
- ☆69Updated 6 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆28Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆60Updated 10 months ago
- OWASP based Web Application Security Testing Checklist☆66Updated 4 months ago
- A simple pentest container equipped with common python pentest tools.☆41Updated last week
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated 11 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆13Updated 4 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆26Updated 9 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 7 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Updated last year
- Web Path Finder☆59Updated 11 months ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 7 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 7 months ago
- ☆76Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆17Updated 4 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆35Updated last month