c3l3si4n / styxLinks
Styx is an cross-platform GUI interface for HackTheBox made in GoLang
☆27Updated last year
Alternatives and similar repositories for styx
Users that are interested in styx are comparing it to the libraries listed below
Sorting:
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆139Updated last month
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 6 months ago
- ☆93Updated 9 months ago
- Multiplayer pivoting solution☆477Updated 2 months ago
- Bruteforce Keepass databases (KDBX 4.x format)☆134Updated last year
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆51Updated last year
- Sliver CheatSheet for OSEP☆232Updated last month
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆227Updated 10 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 11 months ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆61Updated 2 years ago
- ORDER - A small Python web-app to practice blind SQLi in order by☆21Updated 4 years ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆23Updated 4 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 9 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆63Updated 3 years ago
- ☆42Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆101Updated 9 months ago
- TUDO — A Vulnerable PHP Web App☆124Updated 2 weeks ago
- winPEAS, but for Active Directory☆171Updated 9 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆79Updated 2 years ago
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆112Updated 2 months ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Updated last year
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Updated 3 years ago
- Make everyone in your VLAN ASRep roastable☆242Updated 3 months ago
- Rust-based linux reverse shell listener.☆12Updated last year
- Some tips for Bug Bounty using LibreOffice☆55Updated 10 months ago
- ☆55Updated last year
- Lab used for workshop and CTF☆389Updated this week
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆178Updated 9 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆69Updated 4 months ago