These are notes and code from my experience working through the UnderTheWire wargames.
☆27Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for underthewire
Users that are interested in underthewire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- Fake msfconsole for the use in demonstrations☆20Oct 13, 2020Updated 5 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 9 months ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- ☆18Jan 22, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Tryhackme rooms & tools☆63May 22, 2020Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- writeups for the past CTF challenges☆15Nov 23, 2020Updated 5 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆64Dec 21, 2020Updated 5 years ago
- ☆12Jun 11, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 2 months ago
- PowerShell scripts and functions aimed at CyberArk management☆12Jul 28, 2025Updated 8 months ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Capture the Flag write-ups for challenged completed by myself.☆13Dec 7, 2020Updated 5 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆25Mar 5, 2026Updated 3 weeks ago
- This tool tests the native, synthetic, and hardware network data path☆18May 1, 2024Updated last year
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆27Mar 17, 2024Updated 2 years ago
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- Invoke CyberArk PARClient.exe Utility with PowerShell☆12Feb 12, 2020Updated 6 years ago
- ☆16Feb 23, 2021Updated 5 years ago
- Addon Stremio optimisé pour le streaming francophone. Intègre indexeurs torrents, services debrid et fonctionnalités avancées pour une ex…☆18Mar 2, 2026Updated 3 weeks ago
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago