The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆36Feb 16, 2026Updated 2 months ago
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Dec 31, 2025Updated 4 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 10 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- Living of the Land of Free SaaS☆72Mar 22, 2026Updated last month
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- RPC to WebClient startup☆57Aug 19, 2025Updated 8 months ago
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 2 months ago
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- some of the commands I usually use when doing HTB machines☆56Jan 1, 2024Updated 2 years ago
- A TUI for Active Directory collection.☆136Mar 17, 2026Updated last month
- Our Tips&Tricks☆149Mar 4, 2026Updated 2 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated last year
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆31Feb 8, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆329Oct 20, 2025Updated 6 months ago
- CLI tool to interact with the BloodHound CE API☆71Mar 6, 2026Updated last month
- ☆164May 5, 2025Updated 11 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Group Policy Objects manipulation and exploitation framework☆304Dec 7, 2025Updated 4 months ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 7 months ago
- A practical client for ADWS in Golang.☆51Mar 3, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- Lnk crafting and research tools☆164Mar 4, 2026Updated 2 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 8 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆175Jul 16, 2023Updated 2 years ago
- ☆31Sep 4, 2024Updated last year
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆77Apr 26, 2026Updated last week
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆39Mar 11, 2026Updated last month
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆130Oct 20, 2025Updated 6 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 10 months ago
- ☆98Feb 28, 2025Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆46Nov 29, 2024Updated last year
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated 3 months ago
- Public release for b01lers CTF 2021. Thanks for playing!☆10Apr 10, 2021Updated 5 years ago