Machines and Challenges
☆40Oct 3, 2019Updated 6 years ago
Alternatives and similar repositories for hackthebox
Users that are interested in hackthebox are comparing it to the libraries listed below
Sorting:
- ☆113Sep 5, 2020Updated 5 years ago
- Writeups for HacktheBox 'boot2root' machines☆2,017Sep 1, 2023Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- Arch distro installer using archiso☆11Feb 12, 2018Updated 8 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- ☆18Sep 6, 2018Updated 7 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- Read-only mirror of https://gitlab.gnome.org/GNOME/gnome-tour☆14Updated this week
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- 💫 ANSI colors library for Lua.☆12Dec 5, 2022Updated 3 years ago
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- Get all possible href | src | url from target url or domain☆40Aug 5, 2020Updated 5 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Nov 2, 2020Updated 5 years ago
- My solutions to RingZer0 CTF programming challenges☆15Aug 15, 2016Updated 9 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- PHP Phiber framework - Build light-weight lightning-fast PhP applications with Phiber☆18Feb 22, 2016Updated 10 years ago
- i3 on Windows 10☆14Sep 22, 2019Updated 6 years ago
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- Write up for the CyberTalents 2017 qualifications round☆12Apr 13, 2017Updated 8 years ago
- ☆10Mar 17, 2020Updated 6 years ago
- Notes of my OSCP study plan☆466Jun 29, 2022Updated 3 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- ☆14Aug 9, 2021Updated 4 years ago
- ☆22Apr 17, 2017Updated 8 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆93Oct 24, 2020Updated 5 years ago
- ☆11Jun 19, 2024Updated last year
- An implementation of NSA's ExplodingCan exploit in Python☆269Jan 4, 2018Updated 8 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- ☆10Oct 24, 2019Updated 6 years ago