Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...
☆20May 26, 2021Updated 4 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- a modern php WAF for AWD game☆21Nov 12, 2018Updated 7 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- 记录流量的http(s)代理+分布式被动漏洞扫描☆24Jun 30, 2019Updated 6 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 5 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 5 months ago
- ☆18Apr 26, 2021Updated 4 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆53May 1, 2025Updated 10 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 8 months ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- ☆23Apr 6, 2019Updated 6 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Mar 13, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆36May 15, 2025Updated 10 months ago
- LLM red teaming datasets from the paper 'Student-Teacher Prompting for Red Teaming to Improve Guardrails' for the ART of Safety Workshop …☆23Oct 12, 2023Updated 2 years ago
- Build your own WiFi jammer with an ESP8266.☆23Mar 8, 2017Updated 9 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- An intentionally vulnerable web application for learning penetration testing techniques.☆31Feb 2, 2026Updated last month
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 6 months ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- Template para proyectos de Pentesting y registrar el contenido en un Vault de Obsidian☆14Aug 5, 2021Updated 4 years ago
- ☆14Dec 15, 2020Updated 5 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆85Nov 7, 2020Updated 5 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Supplement of the ICFP'22 paper "‘do’ Unchained: Embracing Local Imperativity in a Purely Functional Language"☆14Feb 15, 2025Updated last year