hackthebox / HacksterLinks
HTB official Discord bot
☆62Updated this week
Alternatives and similar repositories for Hackster
Users that are interested in Hackster are comparing it to the libraries listed below
Sorting:
- ☆45Updated last year
 - Play Hack The Box directly on your system.☆51Updated 2 months ago
 - Templates for submissions☆82Updated 3 months ago
 - Red Teaming tools and techniques☆55Updated 2 years ago
 - Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆47Updated this week
 - ☆63Updated 3 months ago
 - A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
 - ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 5 months ago
 - This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆68Updated last month
 - Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 5 months ago
 - HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year
 - A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
 - Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
 - Command line client for HackTheBox☆23Updated last year
 - WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆59Updated 2 years ago
 - A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
 - Simple HTTP listener for security testing☆117Updated 11 months ago
 - A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆47Updated 3 years ago
 - Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆166Updated last year
 - ☆65Updated 2 years ago
 - Notes for red teamers - from cloud to Active Directory to many things in between.☆60Updated last year
 - The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
 - ☆78Updated 2 years ago
 - Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last week
 - ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
 - Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆23Updated last year
 - Using Discord as a C2 - Proof of Concept☆61Updated 2 years ago
 - A compact guide to network pivoting for penetration testings / CTF challenges.☆215Updated last year
 - Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆44Updated 8 months ago
 - In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆30Updated last year