A small cli utility for interacting with Hack the Box
☆35Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for htbcli
Users that are interested in htbcli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- The most complete and up-to-date repository for BladeRF and YateBTS compatibility☆29Apr 9, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- ☆19Mar 16, 2021Updated 5 years ago
- ☆62Jul 9, 2023Updated 2 years ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 5 years ago
- Command-line client to interact with Hack The Box☆16Apr 9, 2020Updated 6 years ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by…☆43Mar 9, 2021Updated 5 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 9 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated 2 months ago
- ☆14Oct 9, 2021Updated 4 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- Notes on "Penetration Testing: A Hands-On Guide To Hacking"☆54May 11, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆24Nov 8, 2019Updated 6 years ago
- A Python API for Hack the Box platform interaction☆64Nov 27, 2020Updated 5 years ago
- Dockerfile that builds a bootable ISO with Linux, Bash, Toybox, Busybox and mounts the virtio 9p export with the "host9p" mount_tag, and …☆20Apr 27, 2022Updated 4 years ago
- Various code snippets☆283Feb 8, 2026Updated 2 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Oct 20, 2025Updated 6 months ago
- Run PowerShell command without invoking powershell.exe☆36Nov 22, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- My Presentations in PDF☆29Apr 20, 2016Updated 10 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Oct 23, 2020Updated 5 years ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- Our CTF to celebrate our hackers approaching $50M in bounty earnings!☆15Mar 25, 2023Updated 3 years ago