iptables rules to only have incoming connections from the machine on TryHackMe
☆221Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for safeVPN-THM
Users that are interested in safeVPN-THM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local File Inclusion To Remote Command Execution (PoC)☆51Apr 10, 2023Updated 3 years ago
- Este script añade la config de s4vitar a bspwm automaticamente!☆304Mar 4, 2024Updated 2 years ago
- Generador de números primos, y demostración práctica de las bases del criptosistema RSA☆11Sep 18, 2022Updated 3 years ago
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Sep 22, 2025Updated 6 months ago
- Cliente de terminal hecho en Bash ideal para trabajar cómodamente desde consola sobre la plataforma de HackTheBox.☆266Aug 31, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- Enlace donde voy a compartir un fichero de obsidian con la recopilación de todos mis apuntes de varias ramas de informática con los segui…☆371Oct 21, 2024Updated last year
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆103Nov 28, 2023Updated 2 years ago
- Herramienta para escanear toda la información previa y necesaria antes de llevar a cabo cualquier tipo de auditoría.☆13Jul 25, 2022Updated 3 years ago
- Minimal bspwm config☆13May 5, 2023Updated 2 years ago
- Local File Inclusion Enumeration (PoC)☆61Jul 2, 2024Updated last year
- Instalacion del entorno de trabajo (por s4vitar) automaticamente!☆111Oct 12, 2022Updated 3 years ago
- Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.☆110Nov 28, 2023Updated 2 years ago
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Web page to list and filter all the machines in the S4vitar excel dynamically.☆16Jul 5, 2025Updated 9 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Apr 3, 2026Updated 2 weeks ago
- ☆206Nov 27, 2025Updated 4 months ago
- Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive mana…☆437Feb 15, 2026Updated 2 months ago
- Herramienta hecha en Bash ideal para automatizar ataques WiFi (WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆428Nov 28, 2023Updated 2 years ago
- Bash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.☆512Jul 19, 2025Updated 9 months ago
- Automatic script to customize your desktop environment, which will apply the following dotfiles using bspwm on kali linux.☆44Jun 6, 2023Updated 2 years ago
- ☆62Nov 17, 2023Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆161May 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Herramienta ideal para el despliegue automatizado de un Rogue AP con capacidad de selección de plantilla + 2FA. No requiere de conexión c…☆601Sep 12, 2021Updated 4 years ago
- Cajón desastre, donde vamos subiendo cositas que pueden ser de interés☆16May 7, 2023Updated 2 years ago
- Pentesting Reporting Tool☆598Oct 22, 2024Updated last year
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆34Mar 4, 2026Updated last month
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Herramienta ideal para la inspección de transacciones en el servicio de exploración de bloques de Bitcoin.☆96Oct 26, 2022Updated 3 years ago
- My ~/.config☆28Jul 10, 2022Updated 3 years ago
- Programa para gestionar WhatsApp desde terminal, ideal para robar/gestionar sesiones tras haber ganar acceso a un dispositivo móvil.☆82Nov 3, 2019Updated 6 years ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆21Dec 3, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Caster - The ECP manipulator for Roku and the ghost in the Cast (Google Chromecast)☆14Jun 10, 2024Updated last year
- Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.☆408Mar 14, 2023Updated 3 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 8 months ago
- ☆29Jan 24, 2021Updated 5 years ago
- Exploits for some windows binaries :)☆51Mar 22, 2026Updated 3 weeks ago
- Os comparto mis apuntes de hackign en MarkDown☆31Sep 26, 2024Updated last year
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆30Sep 1, 2023Updated 2 years ago