TryHackBox / BooksLinks
This repository is related to specialized books published by the THB team.
☆19Updated 2 months ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Updated 10 months ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Updated 6 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- Red Team Roadmap [defination, job positions, skills, tools]☆63Updated last year
- Malware that we analyzed on our site.☆24Updated last year
- Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)☆284Updated 3 weeks ago
- ☆16Updated 9 months ago
- One proxy to rule them all☆125Updated last year
- ☆162Updated 2 years ago
- Recon (Whois)☆14Updated 2 years ago
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆140Updated 10 months ago
- CorsOne - CORS Misconfiguration Discovery Tool☆25Updated last month
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆24Updated 7 months ago
- Powershell script to help Speed up Threat hunting incident response processes☆44Updated last year
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆25Updated 8 months ago
- HTTP/S Service Monitor Script This Bash script periodically monitors the availability and content of web services (HTTP/HTTPS) specified…☆15Updated last month
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆88Updated last year
- ☆34Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆20Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Dorsa Lab Vulnerable Web Application☆22Updated 3 years ago
- This is a collection of Worms for educational purposes☆33Updated 3 months ago
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆57Updated last year
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆39Updated 3 years ago
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆20Updated 2 months ago
- Fake WiFi Hacking Tool for Windows Reverse Shell☆31Updated last year
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆17Updated 11 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆21Updated 3 years ago
- Domain Availability Checker☆164Updated 3 months ago