Xh4H / htb-custom-clientLinks
A set of extended funcionalities for HTB website
☆11Updated 5 years ago
Alternatives and similar repositories for htb-custom-client
Users that are interested in htb-custom-client are comparing it to the libraries listed below
Sorting:
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Updated 4 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- Script for Local Windows Enumeration☆32Updated 7 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- Automated tool to find backup files that may disclose a website's source code☆20Updated 2 years ago
- Shared reverse shell over Discord☆131Updated 4 years ago
- ☆36Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- 👹☆56Updated 3 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou☆30Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- ☆20Updated 3 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- ☆18Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- ☆64Updated 11 months ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆119Updated 5 years ago
- Miscellaneous scripts and tools☆16Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- Custom exploits that I made for Hack The Box machines!☆36Updated 3 years ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆23Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- The walkthrough of hack the box☆67Updated 2 years ago
- brute-forcing su for fun and possibly profit☆92Updated 6 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 4 months ago