TryHackBox / BooksLinks
This repository is related to specialized books published by the THB team.
☆19Updated last month
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- Exposing CharmingKitten's malicious activity for IRGC-IO devision Counterintelligence devision (1500)☆97Updated last week
- Malware that we analyzed on our site.☆24Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Updated 10 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Updated 5 months ago
- Red Team Roadmap [defination, job positions, skills, tools]☆63Updated last year
- ☆160Updated 2 years ago
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆140Updated 9 months ago
- One proxy to rule them all☆125Updated last year
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆24Updated 7 months ago
- ☆16Updated 9 months ago
- This is a collection of Worms for educational purposes☆32Updated 2 months ago
- Various PowerShell scripts that may be useful during red team exercise☆22Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆86Updated last year
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆60Updated this week
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆39Updated 2 years ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆24Updated 6 months ago
- Cybersecurity Roadmap - Tools Installer - Cheat Sheet - Check List☆15Updated this week
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Updated 2 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆57Updated last month
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆65Updated 3 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆110Updated 5 months ago
- ☆100Updated last year
- Recon (Whois)☆14Updated 2 years ago
- Keygen for Positive Technologies Network Attack Detector☆30Updated last year
- HTTP/S Service Monitor Script This Bash script periodically monitors the availability and content of web services (HTTP/HTTPS) specified…☆15Updated last week