p4wsec / hacktheboxLinks
☆12Updated 6 years ago
Alternatives and similar repositories for hackthebox
Users that are interested in hackthebox are comparing it to the libraries listed below
Sorting:
- ☆92Updated 2 years ago
- ☆57Updated 8 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- My notebook for OSCP Lab☆25Updated 7 years ago
- A collection of scripts from around the web to be used with OSCP☆11Updated 8 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- AWS S3 Bucket Finder.☆15Updated 5 years ago
- 👽 Exploits written for research purposes.☆11Updated 3 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Malware-Analysis-Kit☆14Updated 9 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago