TryHackBox / BooksLinks
This repository is related to specialized books published by the THB team.
☆17Updated 2 weeks ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Updated 4 months ago
- Malware that we analyzed on our site.☆24Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 11 months ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆14Updated 8 months ago
- Red Team Roadmap [defination, job positions, skills, tools]☆63Updated last year
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆140Updated 8 months ago
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆55Updated last year
- One proxy to rule them all☆125Updated last year
- ☆16Updated 8 months ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆86Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆24Updated 5 months ago
- CorsOne - CORS Misconfiguration Discovery Tool☆24Updated 3 weeks ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆20Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆22Updated 3 years ago
- ☆29Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- ☆161Updated last year
- Web Penetration Testing Course Materials☆32Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- Framework for generating audit commands for Unix security audits☆66Updated 2 years ago
- Recon (Whois)☆15Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆20Updated 6 months ago
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆20Updated 2 weeks ago
- ☆46Updated 2 months ago
- PoC that downloads an executable from a public SSL certificate☆126Updated last month
- ☆41Updated 2 months ago
- redteamrecipe.com☆24Updated last year