Koth - a repository with cheat-sheet Koth in THM (Try Hack Me)
☆12Aug 7, 2023Updated 2 years ago
Alternatives and similar repositories for Koth-THM
Users that are interested in Koth-THM are comparing it to the libraries listed below
Sorting:
- TelegramStarsBot is a Telegram bot that allows users to purchase images using Telegram Stars (XTR), an internal currency. This bot demons…☆20Aug 29, 2024Updated last year
- ☆10Apr 18, 2019Updated 6 years ago
- i3 rice Inspired by Cyberpunk 2077☆38Oct 6, 2021Updated 4 years ago
- Send arbitrary AT commands to your modem (Python)☆11Dec 12, 2018Updated 7 years ago
- Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher☆13Dec 23, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Updated this week
- Silvery Themes For Plasma Desktop☆11Dec 12, 2025Updated 3 months ago
- ☆13Jan 7, 2023Updated 3 years ago
- LSTM based lottery forecast model☆14Feb 6, 2023Updated 3 years ago
- Arachni is one of the famous web scanner. This project is python script to handle arachni api.☆13Jun 4, 2018Updated 7 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆22Feb 23, 2025Updated last year
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- ☆26Dec 21, 2025Updated 3 months ago
- Using TensorFlow to win 65 time more in the French lottery. A TensorFlow 2.0 tutorial with some nice combinatorics and a get-rich-quick c…☆16Dec 2, 2025Updated 3 months ago
- Whatsapp Intruder☆30Oct 21, 2025Updated 5 months ago
- All WriteUps and Flags of TryHackMe☆11Nov 24, 2020Updated 5 years ago
- A computer vision approach for crop line detection, and heading angle estimation.☆17May 16, 2022Updated 3 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- Homelab infrastructure definitions and configuration☆23Updated this week
- This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 an…☆15Apr 23, 2024Updated last year
- Scripts for an ACAB-Installation☆16Mar 18, 2024Updated 2 years ago
- A public api by which you can find some details of any mobile number in india.☆25Jun 6, 2018Updated 7 years ago
- ☆18Jun 30, 2017Updated 8 years ago
- CVE-2022-41040 nuclei template☆19Oct 2, 2022Updated 3 years ago
- A LaTeX class for memos.☆22Nov 21, 2024Updated last year
- ☆25Mar 26, 2024Updated last year
- We are always looking for ways to leverage the Elastic Stack to add value to the Elastic and cybersecurity community.☆31Feb 10, 2024Updated 2 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆24Mar 31, 2024Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Minimal i3 window manager configuration with installation script | supported for Arch and Arch based, Ubuntu and Ubuntu based distros☆32Aug 16, 2025Updated 7 months ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆28Dec 22, 2024Updated last year
- p2pool mining network public node scanner☆40Jan 26, 2016Updated 10 years ago
- ☆24Aug 3, 2024Updated last year
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- SANS Holiday Hack Challenge write-up template☆28Nov 20, 2023Updated 2 years ago
- A tool that encrypt and hide your data inside your images.☆29Oct 24, 2021Updated 4 years ago