mxrch / htb_apiLinks
A lot of endpoints for the HackTheBox API.
☆13Updated 5 years ago
Alternatives and similar repositories for htb_api
Users that are interested in htb_api are comparing it to the libraries listed below
Sorting:
- Scripts for OSCE☆18Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- interact with HackTheBox from your terminal☆24Updated 6 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- A Web Server to hide stuff☆21Updated 3 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- The Cloud Blocker☆108Updated 7 months ago
- DNS server for pentesters☆49Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago