These are notes and code from my experience working through the UnderTheWire wargames.
☆27Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for underthewire
Users that are interested in underthewire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- CTFs as you need them☆30May 3, 2023Updated 3 years ago
- ☆62Jul 23, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆22Dec 24, 2021Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- ☆33Jan 25, 2021Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆21Jul 2, 2023Updated 2 years ago
- ☆19Apr 16, 2026Updated 3 weeks ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- VirusTotal public api interface implementation in Golang.☆15Sep 23, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Python script for automating Google form filling.☆35Jun 24, 2018Updated 7 years ago
- Tryhackme rooms & tools☆63May 22, 2020Updated 5 years ago
- This is an instagram clone project developed using DJANGO2.22 Framework and Bootstrap 4, to replicate Original Instagram with the aim of …☆10Oct 4, 2023Updated 2 years ago
- A command line tool to search AttackerKB.☆54Jan 16, 2021Updated 5 years ago
- An example on generic netlink communications between the kernel and user-space processes.☆12Jun 13, 2022Updated 3 years ago
- This is a tutorial was to teach how to create a simple, secure and robust nodejs server but we have expanded our scope to cloudinary and …☆16Dec 11, 2022Updated 3 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆64Dec 21, 2020Updated 5 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- Unsupervised coverage-guided btrfs fuzzer☆15Nov 13, 2020Updated 5 years ago
- ☆14Feb 25, 2025Updated last year
- Displays HDF5 files in VS code☆11Dec 20, 2022Updated 3 years ago
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆24Jan 13, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PowerShell scripts and functions aimed at CyberArk management☆12Jul 28, 2025Updated 9 months ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 3 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Capture the Flag write-ups for challenged completed by myself.☆13Dec 7, 2020Updated 5 years ago
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆23Jan 23, 2024Updated 2 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆15Dec 5, 2023Updated 2 years ago