D3vil0p3r / htb-toolkit
Play Hack The Box directly on your system.
☆37Updated last month
Related projects ⓘ
Alternatives and complementary repositories for htb-toolkit
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆47Updated 8 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆64Updated 8 months ago
- Red Teaming tools and techniques☆46Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆26Updated 9 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆56Updated 6 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆60Updated 10 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆12Updated 3 months ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆43Updated 7 months ago
- ☆26Updated last year
- ☆23Updated 11 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆35Updated 10 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated 11 months ago
- ☆76Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆13Updated 2 years ago
- Automated solution for nmap'ing☆22Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆36Updated last month
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆41Updated 10 months ago
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆36Updated last month
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 3 months ago
- OWASP based Web Application Security Testing Checklist☆65Updated 3 months ago
- Chrome extension tool for OSINT & Recon☆50Updated 7 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- A simple pentest container equipped with common python pentest tools.☆41Updated last week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 10 months ago