A script to protect your king in KoTH
☆18May 13, 2022Updated 3 years ago
Alternatives and similar repositories for koth-protect-king
Users that are interested in koth-protect-king are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Koth - TryHackMe Tricks☆192Nov 5, 2023Updated 2 years ago
- A simple script to automate systemd backdoor☆39Dec 19, 2022Updated 3 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- rootkit for tryhackme king of the hill☆12Apr 7, 2024Updated 2 years ago
- exploit for CVE-2017-1000486 vulnerability with SOCKS proxy support☆18Apr 18, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- CVE-2024-23692 Exploit☆13Jun 18, 2024Updated last year
- ☆44Dec 11, 2022Updated 3 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- PenTest - Penetration Testing Tools Downloader☆28Aug 29, 2022Updated 3 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆104Dec 7, 2024Updated last year
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Extract GraphQL operations from javascript☆23Mar 18, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 6 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated last year
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Feb 28, 2025Updated last year
- 「🔑」Discord Brute Force Token☆10Mar 15, 2021Updated 5 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- an working os in c☆22Jan 19, 2026Updated 3 months ago
- A TCP Backdoor made in python☆16Dec 18, 2021Updated 4 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Mar 10, 2025Updated last year
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Sep 29, 2023Updated 2 years ago
- This project is to install some tools to help me and everyone to install easily some common stuffs for bug bounty☆23Dec 2, 2022Updated 3 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- yet another hidden LKM hunter☆32Sep 18, 2025Updated 7 months ago