Collection of scripts and documentations of retired machines in the hackthebox.eu platform
☆41Feb 7, 2020Updated 6 years ago
Alternatives and similar repositories for HackTheBox
Users that are interested in HackTheBox are comparing it to the libraries listed below
Sorting:
- ☆114Sep 5, 2020Updated 5 years ago
- A Discord Bot in Python for Hack The Box members.☆39Feb 13, 2021Updated 5 years ago
- DEF CON Hacker Tracker☆14Jul 30, 2025Updated 7 months ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Scripts that automate portions of pentests.☆57Updated this week
- Use this Python Bot that Automates like4like.org to Gain Free Credit.☆16Apr 4, 2023Updated 2 years ago
- ☆134Aug 22, 2020Updated 5 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Sep 16, 2018Updated 7 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆112Feb 14, 2022Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- Script for grabbing markdown files and Obsidian attachments from one folder and copying them to another.☆29Sep 21, 2021Updated 4 years ago
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆10Dec 10, 2013Updated 12 years ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- List of OSINT Capture The Flag platforms☆34Updated this week
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Python Exploitation Framework☆30Updated this week
- # LIRI Bot ### Overview In this assignment, you will make LIRI. LIRI is like iPhone's SIRI. However, while SIRI is a Speech Interpretat…☆11Feb 15, 2019Updated 7 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- ATHERCRC32 Provide developers with a complete framework for using CRC32 in functions/classes in memory, and protecting your software agai…☆15Jan 29, 2021Updated 5 years ago
- Bug Bounty statistics tool.☆33Nov 17, 2022Updated 3 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- With Slidable you can swipe any widget to perform an action on swipe in your Flutter app.☆11Nov 24, 2020Updated 5 years ago
- A 64 bit OS☆10Nov 12, 2025Updated 3 months ago
- MDISEC Twitch yayınlarına katılan topluluk tarafından hazırlanacak makalelerin süreç yönetimi için kullanılan repodur.☆75Feb 10, 2025Updated last year
- Writeups for the machines on ethical hacking site Hack the Box☆250Feb 28, 2022Updated 4 years ago
- Opinionated set of tools created by Apptension☆10May 30, 2017Updated 8 years ago
- ☆13Jan 25, 2021Updated 5 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago