bee-san / How-I-Hacked-Your-Pi-HoleView external linksLinks
Created for my TryHackMe room
☆181Dec 31, 2019Updated 6 years ago
Alternatives and similar repositories for How-I-Hacked-Your-Pi-Hole
Users that are interested in How-I-Hacked-Your-Pi-Hole are comparing it to the libraries listed below
Sorting:
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 5 years ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 4 years ago
- ☆39Jul 1, 2023Updated 2 years ago
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- ☆17Jul 1, 2023Updated 2 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Proof of Concept for CVE-2019-18634☆233Sep 12, 2021Updated 4 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆633Nov 6, 2021Updated 4 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,371Apr 23, 2025Updated 9 months ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Mar 6, 2023Updated 2 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- Automatic python3 script to exploit CSE BookStore v1.0☆14Jun 16, 2021Updated 4 years ago
- ☆35Jul 31, 2024Updated last year
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Mar 7, 2022Updated 3 years ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆14Oct 18, 2024Updated last year
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- ☆2,711Aug 7, 2024Updated last year
- Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965☆373Nov 9, 2022Updated 3 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,547Jan 12, 2025Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,840Dec 25, 2023Updated 2 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Get the unique machine id of any host (without admin privileges)☆21Jul 15, 2025Updated 7 months ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆27Dec 27, 2025Updated last month
- Simple C# Port Scanner (Multi-Threaded)☆51Jan 23, 2021Updated 5 years ago
- For my book on Python https://beesec.gitbook.io/python-zero-to-hero/☆32Nov 3, 2020Updated 5 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Dec 7, 2020Updated 5 years ago
- ☆54Jun 1, 2024Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Jan 7, 2026Updated last month
- tryhame rooms walkthrough☆49Updated this week
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Random stuff☆19May 28, 2024Updated last year
- A handfull of writeups☆15Jul 1, 2021Updated 4 years ago