JohnHammond / overthewire_natas_solutionsLinks
As requested on YouTube, this is an archive of my Python scripts and code that I've used to solve the Natas challenges from OverTheWire.
☆25Updated 3 years ago
Alternatives and similar repositories for overthewire_natas_solutions
Users that are interested in overthewire_natas_solutions are comparing it to the libraries listed below
Sorting:
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Updated 5 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆19Updated 2 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆37Updated 5 years ago
- List of commands and techniques to while conducting any kind of hacking :)☆132Updated last year
- The entire walkthrough of all my resolved TryHackMe rooms☆71Updated 2 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Updated 6 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆25Updated 6 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- List of advanced XSS payloads☆87Updated 9 years ago
- A collection of various capture the flag event write-ups and anomalies☆42Updated 6 years ago
- This is a clone of the of Introduction To Linux repo that I developed for the class I taught at the US Coast Guard Academy.☆65Updated 7 years ago
- List of Awesome Red Teaming Resources☆114Updated 6 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆34Updated 2 years ago
- ☆81Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Freely available programming books☆68Updated 7 years ago
- ☆76Updated 4 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- A curated list of hacking environments where you can train your cyber skills legally and safely☆92Updated 5 years ago
- A collection of python scripts that are used for network analysis and testing.☆58Updated 6 years ago
- A list of web application security☆80Updated 7 years ago
- ☆28Updated 5 years ago
- A collection of personal scripts used in hacking excercises.☆153Updated 4 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆147Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Updated 5 years ago