HackTheBox Academy Modules writeups and notes
☆27Feb 10, 2024Updated 2 years ago
Alternatives and similar repositories for hackthebox
Users that are interested in hackthebox are comparing it to the libraries listed below
Sorting:
- ☆16Jun 21, 2024Updated last year
- QROA: A Black-Box Query-Response Optimization Attack on LLMs☆14May 23, 2025Updated 9 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- ☆16Oct 11, 2023Updated 2 years ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- konboot iso and Sticky key backddoor.☆22Apr 17, 2019Updated 6 years ago
- Make your first Pull Request on Hacktoberfest 2023. Don't forget to spread love and if you like give us a ⭐️☆11Oct 27, 2023Updated 2 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆60Feb 27, 2026Updated 3 weeks ago
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated last year
- advance web crawler to crawl urls from website using python.☆10Apr 24, 2023Updated 2 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- 🗄️ Collection and organization of information ℹ️☆19Updated this week
- Publicly availalbe vulnarble by desgin vm/machines☆43Aug 10, 2022Updated 3 years ago
- Daily C2 threat intelligence feed☆19Updated this week
- My personal collection of nuclei templates made for fuzzing.☆29Sep 6, 2024Updated last year
- This repository is designed to help beginners understand GitHub Actions through simple, practical examples. It covers the fundamentals of…☆57Jan 29, 2026Updated last month
- Aadhar Data Extraction is a computer vision-based tool that uses the YOLO model for object detection and the EasyOCR library for optical …☆11Apr 17, 2023Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- 💥 Implementation of zip bomb, using python script.☆12Dec 18, 2021Updated 4 years ago
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year
- ☆28Dec 5, 2025Updated 3 months ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Feb 20, 2025Updated last year
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Jan 10, 2026Updated 2 months ago
- Scripts for pushing models to huggingface repos☆15Mar 13, 2026Updated last week
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- ☆13May 9, 2023Updated 2 years ago
- ☆20Jul 4, 2022Updated 3 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- NoC simulation using gem5 (a simple tul)☆14Mar 23, 2024Updated last year
- Simple android application to extract SMS from device into CSV file☆17Nov 29, 2020Updated 5 years ago