tricks I discovered while playing king of the hill
☆17Jun 28, 2023Updated 2 years ago
Alternatives and similar repositories for thm-koth-tricks
Users that are interested in thm-koth-tricks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rootkit for tryhackme king of the hill☆12Apr 7, 2024Updated 2 years ago
- Koth - TryHackMe Tricks☆192Nov 5, 2023Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 4 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Extract GraphQL operations from javascript☆23Mar 18, 2026Updated last month
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 6 years ago
- exploit for CVE-2017-1000486 vulnerability with SOCKS proxy support☆18Apr 18, 2023Updated 3 years ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Anti-analysis tool that obfuscates ELF files☆39Mar 16, 2021Updated 5 years ago
- A fun feature full phone right in your browser. Dial on desktop, mobile and in Discord voice chat.☆35Mar 6, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆41May 9, 2024Updated last year
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 an…☆15Apr 23, 2024Updated 2 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- A security.txt parser for PHP☆13Oct 8, 2017Updated 8 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- An ASCII presentation tool in PHP☆21Aug 13, 2012Updated 13 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- ☆19Apr 16, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- TryHackMe bot for maintaining your streak.☆13May 20, 2023Updated 2 years ago
- learn about computer architecture☆41May 6, 2024Updated last year
- CPSA exam prep resources☆18Sep 11, 2024Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution☆42Sep 28, 2021Updated 4 years ago
- Command Execution exploiter with an auto connection handling☆31Jun 15, 2022Updated 3 years ago
- A Simple CTFd Plugin that will act as a flag generator and validator☆15Nov 23, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 3 years ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 5 months ago
- ☆81Jun 4, 2025Updated 11 months ago
- ☆28Aug 4, 2024Updated last year
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆24Jun 13, 2023Updated 2 years ago
- Various exploit scripts and code snippets I've created over the years for HTB, Vulnhub, CTFs, etc.☆24Sep 28, 2018Updated 7 years ago
- Analyze Warframe Profit-Taker run from EE.log, marking important timestamps and total time elapsed.☆15Oct 8, 2022Updated 3 years ago