Created for my TryHackMe room
☆185Dec 31, 2019Updated 6 years ago
Alternatives and similar repositories for How-I-Hacked-Your-Pi-Hole
Users that are interested in How-I-Hacked-Your-Pi-Hole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for the TryHackMe room hackerNote☆31Feb 20, 2020Updated 6 years ago
- A command line tool to search AttackerKB.☆54Jan 16, 2021Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- tryhame rooms walkthrough☆63Apr 22, 2026Updated last week
- ☆16Dec 16, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof of Concept for CVE-2019-18634☆238Sep 12, 2021Updated 4 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,389Apr 23, 2025Updated last year
- For my book on Python https://beesec.gitbook.io/python-zero-to-hero/☆32Nov 3, 2020Updated 5 years ago
- ☆41Jul 1, 2023Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆645Nov 6, 2021Updated 4 years ago
- Linux PAM Backdoor☆373Nov 13, 2023Updated 2 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆23Jul 26, 2022Updated 3 years ago
- See more at:☆16Jun 3, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,593Jan 12, 2025Updated last year
- ☆2,771Aug 7, 2024Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,893Dec 25, 2023Updated 2 years ago
- TryHackMe documentation site source code☆65Feb 14, 2026Updated 2 months ago
- Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965☆374Nov 9, 2022Updated 3 years ago
- Hash type identifier (CLI & lib)☆965Apr 22, 2026Updated last week
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Feb 9, 2017Updated 9 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,905Sep 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,914Apr 22, 2026Updated last week
- Stuff I use for OSCP/HTB/VHL and so on.☆112Jan 21, 2020Updated 6 years ago
- ☆51Aug 16, 2021Updated 4 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- Toolset for automating common management actions used in CTF's☆41Jul 28, 2021Updated 4 years ago
- Active Directory Wordlists☆111May 28, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple C# Port Scanner (Multi-Threaded)☆51Jan 23, 2021Updated 5 years ago
- ☆17Sep 15, 2023Updated 2 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Mar 7, 2022Updated 4 years ago
- JAWS - Just Another Windows (Enum) Script☆1,942Apr 19, 2021Updated 5 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆526May 26, 2020Updated 5 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆11Jul 6, 2018Updated 7 years ago