My write-up on TryHackMe, HackTheBox, and CTF.
☆71Dec 16, 2020Updated 5 years ago
Alternatives and similar repositories for writeUp
Users that are interested in writeUp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Knowledge Base of Exploitation Techniques☆61Apr 30, 2025Updated last year
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 8 months ago
- Intelligence gathering framework☆15Jul 23, 2015Updated 10 years ago
- English translation of Cyberhub CTF guidebook + add-ons☆18Jul 10, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 5 years ago
- Writeups for all the HTB machines I have done☆63Jun 22, 2023Updated 2 years ago
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆831Dec 15, 2025Updated 4 months ago
- Reconness Agents Script☆32Jul 25, 2022Updated 3 years ago
- Golang tool for Next.js reconnaissance - uncover build IDs, routes, and assets with bot management evasion.☆35Apr 21, 2025Updated last year
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆35Jan 4, 2023Updated 3 years ago
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Current CIDR-formatted list of unwanted bots caught on my systems.☆17Sep 28, 2021Updated 4 years ago
- The place to talk about our infrastructure or everything related to the Ultimate Hosts Blacklist project.☆12Oct 2, 2024Updated last year
- Automatic Service Enumeration Script☆230Oct 12, 2022Updated 3 years ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated 2 years ago
- Reuploading the code she removed.☆14May 27, 2019Updated 6 years ago
- A personal filterlist for blocking trackers/ads/malware/antiadblock/adware/data-mining and all other unacceptable/unwarranted network re…☆11Oct 4, 2022Updated 3 years ago
- Notes from OSCP, CTF, security adventures, etc...☆66Feb 6, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Comprehensive hosts to block Ads, Analytics, Tracking & Telemetry based on Exodus list☆11Oct 31, 2024Updated last year
- My personal repository☆13Jan 18, 2026Updated 3 months ago
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 9 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆32Nov 4, 2018Updated 7 years ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆487Aug 25, 2021Updated 4 years ago
- ☆13Feb 10, 2021Updated 5 years ago
- ☆13Sep 12, 2022Updated 3 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆19Feb 14, 2020Updated 6 years ago
- ☆12Feb 28, 2020Updated 6 years ago
- BPStegano is a steganography tool built using Python 3. It uses AES-128 encryption a custom LSB random pixel algorithm hiding to hide raw…☆26Feb 22, 2021Updated 5 years ago
- A very aggressive blocking list for your pihole. This list is very aggressive, you will have to manually unblock things frequently if you…☆12May 5, 2021Updated 4 years ago
- List of sensitive fields that should be masked, obfuscated, or purged for security purposes☆22Sep 11, 2023Updated 2 years ago
- Code for the USB write blocker built on the FTDI VNC2 development board☆10Aug 17, 2021Updated 4 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆27Feb 10, 2026Updated 2 months ago