Cheatsheets
☆19Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for HackTheBox
Users that are interested in HackTheBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reject membrane, embrace monke☆10Jan 7, 2022Updated 4 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Repo for malware development practices I post on my blog☆36Oct 5, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Scripts for Pentesting☆14May 29, 2025Updated 11 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 4 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 8 years ago
- Rekhta Dictionary Extension code☆10Aug 9, 2022Updated 3 years ago
- Election results data reported for Pakistan 2018 general elections☆11Sep 5, 2018Updated 7 years ago
- Jekyll theme for documentation 📝 built with material web components☆12Apr 18, 2026Updated 2 weeks ago
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 3 years ago
- How to use uBlock Origin to hide like counts on Twitter and karma points on Reddit☆12Dec 25, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated 2 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆32Apr 2, 2025Updated last year
- A dynamic cheat sheet for PEN-200, OSCP, and other pentests made with Google Sheets☆86Jun 17, 2024Updated last year
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 4 months ago
- ☆13Aug 31, 2020Updated 5 years ago
- An Open Source, USB & BLE 5.0, Modular, Hot-Swappable, 60% Mechanical Keyboard☆16Sep 18, 2020Updated 5 years ago
- A Jekyll theme for hosting documentation on GitHub Pages.☆20Jul 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- Character Entities for HTML, CSS (content) and Javascript.☆15Aug 1, 2021Updated 4 years ago
- Apache ECharts From Mermaid☆22Apr 10, 2026Updated 3 weeks ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Todos los comandos necesarios para aprobar el eJPT☆13Sep 28, 2021Updated 4 years ago
- Dataset for Urdu Ghazals☆21Aug 14, 2023Updated 2 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆100Sep 27, 2021Updated 4 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- 🇪🇸 Los dotfiles de mi entorno en ARCH orientado a PENTESTING, con un autoinstalador. ¡Funciona en Nativo y MV! 🇬🇧 My ARCH dotfiles…☆15Jun 25, 2023Updated 2 years ago
- Source code for Django Testing Tutorial☆11Jul 17, 2022Updated 3 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 11 months ago
- ☆16May 21, 2019Updated 6 years ago