D3vil0p3r / htb-toolkit
Play Hack The Box directly on your system.
☆48Updated 2 weeks ago
Alternatives and similar repositories for htb-toolkit:
Users that are interested in htb-toolkit are comparing it to the libraries listed below
- Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible Y…☆12Updated 2 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 6 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆61Updated last month
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆33Updated last week
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆42Updated 6 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆61Updated last month
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- A script to protect your king in KoTH☆15Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- IoT Camera Reconnaissance and Live Viewer☆138Updated 8 months ago
- ☆27Updated 9 months ago
- Chrome extension tool for OSINT & Recon☆54Updated last year
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, cr…☆23Updated 3 weeks ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆59Updated 3 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated 3 weeks ago
- Automated solution for nmap'ing☆27Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last week
- This is the open sourced code for the extension, EndPointer☆61Updated 4 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆17Updated 8 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆68Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 11 months ago
- ☆51Updated last year
- Here are some cool and some unpublished Dorks☆70Updated 2 months ago
- ☆30Updated 2 years ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆27Updated 5 months ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ☆45Updated 3 weeks ago