These are notes and code from my experience working through the UnderTheWire wargames.
☆27Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for underthewire
Users that are interested in underthewire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- ☆62Jul 23, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆22Dec 24, 2021Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- ☆33Jan 25, 2021Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- The official StrawPoll API v3☆13Oct 8, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆21Jul 2, 2023Updated 2 years ago
- ☆18Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- VirusTotal public api interface implementation in Golang.☆15Sep 23, 2014Updated 11 years ago
- Tryhackme rooms & tools☆63May 22, 2020Updated 5 years ago
- This is an instagram clone project developed using DJANGO2.22 Framework and Bootstrap 4, to replicate Original Instagram with the aim of …☆10Oct 4, 2023Updated 2 years ago
- A command line tool to search AttackerKB.☆54Jan 16, 2021Updated 5 years ago
- An example on generic netlink communications between the kernel and user-space processes.☆12Jun 13, 2022Updated 3 years ago
- This is a tutorial was to teach how to create a simple, secure and robust nodejs server but we have expanded our scope to cloudinary and …☆16Dec 11, 2022Updated 3 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- 🖥 📊 🕹 🛠 A curated list of command line apps☆15Dec 22, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- ☆12Jun 11, 2024Updated last year
- Documentation website for Rod☆22Feb 17, 2026Updated 2 months ago
- Industrial Control Systems Network Scanner☆24Nov 8, 2015Updated 10 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- Toy container-aware loadBalancer in Go☆14Mar 23, 2023Updated 3 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 3 years ago
- ☆13Mar 4, 2021Updated 5 years ago
- ☆15Oct 14, 2025Updated 6 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Capture the Flag write-ups for challenged completed by myself.☆13Dec 7, 2020Updated 5 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆27Mar 5, 2026Updated last month