mach1el / htb-scriptsLinks
Scripts,shell used for solving box
☆15Updated 5 years ago
Alternatives and similar repositories for htb-scripts
Users that are interested in htb-scripts are comparing it to the libraries listed below
Sorting:
- Dirtycow exploit for both 32 and 64-bit☆29Updated 7 years ago
- ☆32Updated 5 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Updated 6 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Updated 5 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Updated 7 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49Updated 10 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- ☆26Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- Reverse Shell-able Windows exploits short POCs.☆34Updated 5 years ago
- ☆102Updated 6 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Notes for CRTP☆42Updated 5 years ago
- A tool to password spray Jenkins instances☆59Updated 6 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- OSWE Preparation☆38Updated 6 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆98Updated 6 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆25Updated last week
- Python3 Ebowla... 3Bowla☆17Updated 6 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Updated 7 years ago
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago