Collection of scripts and documentations of retired machines in the hackthebox.eu platform
☆42Feb 7, 2020Updated 6 years ago
Alternatives and similar repositories for HackTheBox
Users that are interested in HackTheBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆114Sep 5, 2020Updated 5 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 10 years ago
- Writeups for all the HTB machines I have done☆63Jun 22, 2023Updated 2 years ago
- ☆137Aug 22, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- A Discord Bot in Python for Hack The Box members.☆39Feb 13, 2021Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Writeups for the machines on ethical hacking site Hack the Box☆248Feb 28, 2022Updated 4 years ago
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last month
- A tool that executes any command or application provisioning its environment with variables from providers (like secrets from Vault).☆11Jul 23, 2024Updated last year
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- DEF CON Hacker Tracker☆14Jul 30, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- Jekyll theme for documentation 📝 built with material web components☆12May 1, 2026Updated last week
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- A Collection of 88x31px GIFs☆14Jun 21, 2024Updated last year
- This package allows you to check whether an IP address belongs to a hosting provider or not. In case the IP address can be successfully l…☆21Oct 22, 2023Updated 2 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- Repository for Ludus french templates☆24Mar 1, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆10Sep 24, 2020Updated 5 years ago
- patch of OpenWrt source to build firmware for the Xiaomi Mi Router 4A Gigabit V2 (RB02/R4AV2)☆13Apr 29, 2023Updated 3 years ago
- Termux interactive package installer☆14Feb 2, 2026Updated 3 months ago
- ☆16Jan 5, 2017Updated 9 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 8 years ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- The walkthrough of hack the box☆67Dec 16, 2022Updated 3 years ago
- ☆21Mar 4, 2021Updated 5 years ago
- ☆13Feb 14, 2020Updated 6 years ago