Scripts,shell used for solving box
☆15Dec 28, 2020Updated 5 years ago
Alternatives and similar repositories for htb-scripts
Users that are interested in htb-scripts are comparing it to the libraries listed below
Sorting:
- Proof of Concept for CVE-2020-0601☆65Mar 22, 2024Updated last year
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated 2 months ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24May 30, 2018Updated 7 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- Dirtycow exploit for both 32 and 64-bit☆29Jul 23, 2018Updated 7 years ago
- The walkthrough of hack the box☆67Dec 16, 2022Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Jan 29, 2021Updated 5 years ago
- Various local exploits☆148Apr 24, 2022Updated 3 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- A small cli utility for interacting with Hack the Box☆35Dec 8, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆13Sep 15, 2024Updated last year
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Query accurate gas prices on every blockchain network ⛽️☆13Jun 16, 2023Updated 2 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Smaller standard C libraries for embedded platforms. Based on https://keithp.com/cgit/newlib.git☆13Jan 4, 2019Updated 7 years ago
- ☆11Apr 26, 2021Updated 4 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- ☆13Jul 24, 2021Updated 4 years ago
- My linux config files☆10Updated this week
- DSA Signature Algorithm - A simple implementation in Python☆12Apr 8, 2018Updated 7 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Functioning desktop testbed for flying the DJI Tello drone via Gobot☆14Jun 15, 2018Updated 7 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Use npm's Arborist to get a dependency tree for a package.☆14Dec 30, 2025Updated 2 months ago
- PEDA - Python Exploit Development Assistance for GDB☆13Jul 13, 2024Updated last year
- Telegram Group Manager Bot Written In Python Using Pyrogram.☆12Aug 25, 2023Updated 2 years ago
- Ansible for Proxmox VE☆10May 28, 2019Updated 6 years ago