Custom exploits that I made for Hack The Box machines!
☆35Aug 3, 2021Updated 4 years ago
Alternatives and similar repositories for hackthebox-exploits
Users that are interested in hackthebox-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Beginners tools for CTF☆17Oct 12, 2022Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Scripts and code example about penetration testing, web, network and exploiting wireless devices.☆11Jun 24, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 💌 Gmail & Facebook Messenger-like notifications☆11Feb 18, 2020Updated 6 years ago
- ☆28Oct 4, 2018Updated 7 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- ☆97Feb 18, 2025Updated last year
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.☆12May 28, 2021Updated 4 years ago
- Simple WordList Generator (GUI)☆13Jan 13, 2020Updated 6 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆52Oct 31, 2017Updated 8 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- ☆18Mar 15, 2018Updated 8 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- ☆13Aug 13, 2021Updated 4 years ago
- The walkthrough of hack the box☆67Dec 16, 2022Updated 3 years ago
- Python client for pfSense-FauxAPI☆13Jan 12, 2026Updated 3 months ago
- ☆12Nov 2, 2015Updated 10 years ago
- Generate CIA/NSA style project codenames☆22Sep 29, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Experiments, snippets and other things related to Binary Ninja☆17Oct 22, 2024Updated last year
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Deliberately vulnerable PHP code examples for testing static analysis tools and security training, covering common vulnerabilities such a…☆12Updated this week
- hack any android phone with this py respiratory.......☆17Sep 11, 2017Updated 8 years ago
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 8 years ago
- Black Hat Ethical Hacking | PHP Backdoor Shell v1.0☆20May 22, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Any hack mobile whit ip☆19Oct 5, 2020Updated 5 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- CTF Write-ups☆19Nov 29, 2020Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆91Oct 18, 2019Updated 6 years ago
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆12Sep 11, 2024Updated last year