Custom exploits that I made for Hack The Box machines!
☆35Aug 3, 2021Updated 4 years ago
Alternatives and similar repositories for hackthebox-exploits
Users that are interested in hackthebox-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Discord Bot in Python for Hack The Box members.☆39Feb 13, 2021Updated 5 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Scripts and code example about penetration testing, web, network and exploiting wireless devices.☆11Jun 24, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Review of AWAE.OSWE☆31Mar 12, 2022Updated 4 years ago
- ☆11May 27, 2021Updated 4 years ago
- ☆28Oct 4, 2018Updated 7 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.☆12May 28, 2021Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆52Oct 31, 2017Updated 8 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- ☆18Mar 15, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Great security list for fun and profit☆29Jul 24, 2017Updated 8 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- Generate CIA/NSA style project codenames☆22Sep 29, 2017Updated 8 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Oct 4, 2018Updated 7 years ago
- Bro Detection Scripts☆10Mar 9, 2021Updated 5 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Feb 13, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 8 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆386Dec 13, 2020Updated 5 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- Any hack mobile whit ip☆19Oct 5, 2020Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆11Sep 11, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This sample shows how to deploy a private AKS cluster with a public DNS zone for the name resolution of the API server name to the privat…☆24Aug 5, 2021Updated 4 years ago
- Python3 compatible linuxprivchecker☆23Jan 21, 2019Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago