A small cli utility for interacting with Hack the Box
☆35Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for htbcli
Users that are interested in htbcli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- The most complete and up-to-date repository for BladeRF and YateBTS compatibility☆29Apr 9, 2023Updated 3 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆19Mar 16, 2021Updated 5 years ago
- ☆62Jul 9, 2023Updated 2 years ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 5 years ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A tool to find the memory address of an environment variable in a binary☆11Jun 23, 2015Updated 10 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 5 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by…☆43Mar 9, 2021Updated 5 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated last month
- ☆14Oct 9, 2021Updated 4 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- ☆27Feb 3, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆78Aug 19, 2024Updated last year
- Backwards compatible callback APIs☆19Jun 9, 2020Updated 5 years ago
- Notes on "Penetration Testing: A Hands-On Guide To Hacking"☆54May 11, 2019Updated 6 years ago
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- Dockerfile that builds a bootable ISO with Linux, Bash, Toybox, Busybox and mounts the virtio 9p export with the "host9p" mount_tag, and …☆20Apr 27, 2022Updated 3 years ago
- Various code snippets☆282Feb 8, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- My Presentations in PDF☆29Apr 20, 2016Updated 9 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Oct 23, 2020Updated 5 years ago
- A Helm chart that deploys a web app defined in docker-compose.yml to Kubernetes☆13Mar 28, 2018Updated 8 years ago