A collection of config files for linux focusing on hackthebox theme
☆53Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for hackthebox-themes
Users that are interested in hackthebox-themes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- ☆16Dec 28, 2024Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated last month
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- A fast subdomain takeover tool☆86Nov 10, 2023Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- CVE-2024-4577 RCE PoC☆25Nov 20, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 5 months ago
- ☆11Sep 15, 2024Updated last year
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆34Oct 25, 2023Updated 2 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 2 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- ☆19Apr 28, 2025Updated 10 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- ☆10Oct 1, 2019Updated 6 years ago
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- ☆53Sep 23, 2025Updated 6 months ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- ☆35Nov 14, 2024Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago
- Proof of Concept for CVE-2025-24367☆34Dec 8, 2025Updated 3 months ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 4 months ago
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆98Mar 17, 2026Updated last week
- Oversecured Vulnerable iOS App☆231Jan 10, 2024Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago