interact with HackTheBox from your terminal
☆24Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for htb-cli
Users that are interested in htb-cli are comparing it to the libraries listed below
Sorting:
- ☆51Jun 24, 2016Updated 9 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- CLI for programmatic trading of cryptocurrencies on GDAX☆17Jan 16, 2018Updated 8 years ago
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A small cli utility for interacting with Hack the Box☆35Dec 8, 2022Updated 3 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 8 months ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Oct 23, 2020Updated 5 years ago
- Linux setup tool for Kali Linux☆81Sep 6, 2018Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Graph visualization of wireless client and access point relationships☆117Dec 14, 2022Updated 3 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆43Apr 18, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- Parse PowerShell and Security event logs for sensitive information.☆128Mar 29, 2019Updated 6 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- DES Rainbow Table Online Phase☆25Aug 2, 2017Updated 8 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Generate CIA/NSA style project codenames☆21Sep 29, 2017Updated 8 years ago
- Scripts to execute enumeration via LFI☆92Apr 8, 2019Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Dec 3, 2018Updated 7 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Oct 21, 2019Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago