Created for my TryHackMe room
☆183Dec 31, 2019Updated 6 years ago
Alternatives and similar repositories for How-I-Hacked-Your-Pi-Hole
Users that are interested in How-I-Hacked-Your-Pi-Hole are comparing it to the libraries listed below
Sorting:
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 5 years ago
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- tryhame rooms walkthrough☆62Feb 22, 2026Updated 3 weeks ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,379Apr 23, 2025Updated 10 months ago
- For my book on Python https://beesec.gitbook.io/python-zero-to-hero/☆32Nov 3, 2020Updated 5 years ago
- ☆39Jul 1, 2023Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆635Nov 6, 2021Updated 4 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- See more at:☆16Jun 3, 2019Updated 6 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,568Jan 12, 2025Updated last year
- ☆35Jul 31, 2024Updated last year
- ☆2,740Aug 7, 2024Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,867Dec 25, 2023Updated 2 years ago
- TryHackMe documentation site source code☆63Feb 14, 2026Updated last month
- ☆11Nov 22, 2021Updated 4 years ago
- Hash type identifier (CLI & lib)☆953Jan 22, 2026Updated last month
- Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965☆374Nov 9, 2022Updated 3 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,860Sep 6, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,829Mar 2, 2026Updated 2 weeks ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Jan 21, 2020Updated 6 years ago
- ☆51Aug 16, 2021Updated 4 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,484Updated this week
- Active Directory Wordlists☆112May 28, 2020Updated 5 years ago
- Simple C# Port Scanner (Multi-Threaded)☆51Jan 23, 2021Updated 5 years ago
- ☆17Sep 15, 2023Updated 2 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Mar 7, 2022Updated 4 years ago
- JAWS - Just Another Windows (Enum) Script☆1,930Apr 19, 2021Updated 4 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆520May 26, 2020Updated 5 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- Basic Flask examples, written in Python3☆18Jan 14, 2021Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,058Oct 9, 2022Updated 3 years ago