MrR3boot / HackTheBoxLinks
Hackthebox automation scripts and writeups.
☆22Updated 5 years ago
Alternatives and similar repositories for HackTheBox
Users that are interested in HackTheBox are comparing it to the libraries listed below
Sorting:
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Quick Repo for any Bug Hunter☆15Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆30Updated 7 months ago
- A curated list of amazingly awesome OSINT☆19Updated 5 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 5 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Updated 7 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- ☆28Updated 6 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Some Templates for Bash Scripting☆16Updated 2 years ago
- Turn your VPS into an attack box☆35Updated last year
- ☆18Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆51Updated 4 months ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆27Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆27Updated 5 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆14Updated 5 years ago
- ☆14Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Python script to launch burp scans automatically☆32Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Validate proxies for specific domain☆36Updated 3 years ago