All my blogs for ExpDev, HTB, BinaryExploit, Etc.
☆13Jul 17, 2024Updated last year
Alternatives and similar repositories for CTF_HTB-Writeups-Scripts
Users that are interested in CTF_HTB-Writeups-Scripts are comparing it to the libraries listed below
Sorting:
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10Jan 5, 2022Updated 4 years ago
- Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555☆73Oct 20, 2020Updated 5 years ago
- Vulnserver exploits☆15May 1, 2020Updated 5 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 3 months ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- A simple place to learn XSS☆31Mar 20, 2021Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Mar 9, 2023Updated 2 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Chrome extension which sets cookies in bulk from raw header text☆13Mar 2, 2023Updated 2 years ago
- IS2C - CC Cybersecurity Course Notes to help you prepare for the exam☆23Sep 27, 2025Updated 5 months ago
- ☆13Jul 29, 2024Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 2 years ago
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- The official Bento distribution - orchestration and deployment infrastructure for the Bento platform.☆11Feb 20, 2026Updated last week
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 5 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- 简书爬虫☆11Apr 15, 2021Updated 4 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- This is for kex repair and solve VNC server error in kali linux android in Termux .☆17Sep 25, 2023Updated 2 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- ☆15Mar 3, 2021Updated 4 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 5 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ChatGPT-like chat bot webapp built with React, Express and TailwindCSS using ollama.ai as backend.☆13Nov 23, 2023Updated 2 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- 毕设,自己挖的一个坑☆11Aug 22, 2016Updated 9 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- This bot copies posts from /r/Python from Reddit and posts them to Twitter while keeping every safety measure in check.☆10Mar 28, 2016Updated 9 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Lemo Chain☆12Feb 25, 2023Updated 3 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- ☆14Mar 5, 2023Updated 2 years ago