d3m0nrul3s / darkLinks
☆13Updated last year
Alternatives and similar repositories for dark
Users that are interested in dark are comparing it to the libraries listed below
Sorting:
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆46Updated last year
- Play Hack The Box directly on your system.☆50Updated 3 months ago
- Exploits for some linux binaries :)☆36Updated 6 months ago
- ☆58Updated last week
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆37Updated 3 months ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- A collection of config files for linux focusing on hackthebox theme☆48Updated 6 months ago
- :)))))☆46Updated last week
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- A script to protect your king in KoTH☆17Updated 3 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆60Updated last year
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 2 years ago
- bWAPP Docker Image☆52Updated 3 years ago
- ☆17Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆135Updated last month
- ☆44Updated 3 years ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 9 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated 9 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆38Updated last month
- OWASP based Web Application Security Testing Checklist☆76Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆29Updated 8 months ago
- ☆55Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆42Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆65Updated 9 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆38Updated last year