Machines and Challenges
☆40Oct 3, 2019Updated 6 years ago
Alternatives and similar repositories for hackthebox
Users that are interested in hackthebox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆113Sep 5, 2020Updated 5 years ago
- Writeups for HacktheBox 'boot2root' machines☆2,024Sep 1, 2023Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- ☆18Sep 6, 2018Updated 7 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- Get all possible href | src | url from target url or domain☆40Aug 5, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Nov 2, 2020Updated 5 years ago
- My solutions to RingZer0 CTF programming challenges☆15Aug 15, 2016Updated 9 years ago
- Write up for the CyberTalents 2017 qualifications round☆12Apr 13, 2017Updated 8 years ago
- Notes of my OSCP study plan☆467Jun 29, 2022Updated 3 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- tryhackme writeups☆13Jun 28, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- …(⊙_⊙;)…☆56Mar 31, 2021Updated 5 years ago
- ☆12May 16, 2020Updated 5 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-a…☆17Jul 22, 2021Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Uma lista curada de recursos sobre a Lei Geral de Proteção de Dados☆11Jan 14, 2022Updated 4 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆38Aug 12, 2020Updated 5 years ago