Write-ups for different challenges I did in this platform.
☆21May 25, 2021Updated 4 years ago
Alternatives and similar repositories for HackTheBox
Users that are interested in HackTheBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Writeups for Hack The Box machines/challenges☆26Nov 4, 2021Updated 4 years ago
- ☆11Sep 15, 2024Updated last year
- Exploits for different vulnerabilities☆12Nov 29, 2021Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- ☆19Sep 30, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Slides from various conferences and talks I've given☆14Oct 12, 2025Updated 7 months ago
- Get newest public disclosed HackerOne report notifications on your Desktop☆15Jan 29, 2020Updated 6 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- ☆26May 14, 2022Updated 4 years ago
- Fixes errors for apktool in kali linux☆13Nov 11, 2023Updated 2 years ago
- My Powershell notes☆16Sep 27, 2022Updated 3 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Subvenkon is a subdomain enumerator from Venkon☆22Jun 22, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All About XSS☆16Oct 23, 2022Updated 3 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- ☆20May 25, 2025Updated 11 months ago
- ☆22May 1, 2024Updated 2 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Jul 23, 2024Updated last year
- Misc stuff from internet☆12Apr 13, 2026Updated last month
- ☆32Jul 14, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Payloads for SQLi☆19May 2, 2020Updated 6 years ago
- Emotion-Age-Gender-Detector is used to predict emotion, age and gender after detecting faces from images, videos and real-time video stre…☆11Jul 6, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Feb 26, 2021Updated 5 years ago
- ☆15Sep 4, 2020Updated 5 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- Write-Ups for CTF challenges☆20Oct 17, 2019Updated 6 years ago
- hacking tools awesome lists☆17Jul 26, 2017Updated 8 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆43Feb 22, 2022Updated 4 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆22Sep 1, 2025Updated 8 months ago
- Golang:采用随机deskey和hex进行文件加密,常用于加密shellcode.☆14May 16, 2021Updated 5 years ago
- 利用api来查询用户的star,仓库的commits、releases、issus。查询关键字更新☆12Mar 7, 2021Updated 5 years ago
- Some POCs or Exploits for vulnerabilities☆12Feb 17, 2019Updated 7 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago