Simple Tricks I use While Playing King Of The Hill
☆18Apr 10, 2020Updated 5 years ago
Alternatives and similar repositories for tryhackme-koth
Users that are interested in tryhackme-koth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Given a text, wrap it into phrases and send them to Yandex's search engine. If it yields a "did you mean:", substitute the original phras…☆11Dec 13, 2018Updated 7 years ago
- TryHackMe documentation site source code☆63Feb 14, 2026Updated last month
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- A script to protect your king in KoTH☆18May 13, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- king of the hill cybersecurity competition☆31May 4, 2022Updated 3 years ago
- Email-Enum searches mainstream websites and tells you if an email is registered!☆19Mar 14, 2019Updated 7 years ago
- List of payloads: reverse shell, bind shell, webshell.☆17Feb 26, 2022Updated 4 years ago
- PoC ransomware. Inspired by Mr. Robot☆10Jan 12, 2022Updated 4 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Jul 18, 2020Updated 5 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 5 years ago
- Script to manage and create local pentesting training virtual lab☆51Jun 7, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆13Jul 11, 2024Updated last year
- Full Stack E-Commerce + Dashboard & CMS offers a comprehensive solution for e-commerce businesses, providing a feature-rich admin portal …☆15Oct 19, 2024Updated last year
- GreyHack Vim implementation☆12Jan 1, 2024Updated 2 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆34Jul 13, 2025Updated 8 months ago
- Repo which contains a small demo to Extract Text from image OCR using Google Vision API in Python☆25Jun 21, 2021Updated 4 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆23Jun 13, 2023Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- This repository contains official source code and writeups for challenges from World Wide CTF 2024 - https://ctftime.org/event/2572☆12Dec 19, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated 3 weeks ago
- Easy links and guides for DEF CON 28 and 29☆57Aug 5, 2021Updated 4 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 8 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- tool to help you automate the evil twin attack in a specific, easy and quick way☆20Dec 14, 2024Updated last year
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆44Jul 16, 2021Updated 4 years ago
- Links to various memory samples☆43Jul 25, 2025Updated 8 months ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 2 years ago
- A collection of web browser CTF challenges and solutions.☆33Dec 30, 2022Updated 3 years ago
- A fast TCP/UDP tunnel over HTTP☆24Jan 9, 2025Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- ☆26Apr 24, 2025Updated 11 months ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 7 months ago