Need help finding what room to do next if grinding points?
☆53Oct 20, 2024Updated last year
Alternatives and similar repositories for thm-room-points
Users that are interested in thm-room-points are comparing it to the libraries listed below
Sorting:
- The Blockchain-based voting system will be secure, reliable, and anonymous, and will help increase the number of voters as well as the tr…☆12Nov 23, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Personal "King of The Hill" toolkit.☆13Nov 5, 2024Updated last year
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- All WriteUps and Flags of TryHackMe☆11Nov 24, 2020Updated 5 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 6 months ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- X Developer Challenge☆11Apr 25, 2024Updated last year
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- ☆17Jun 21, 2024Updated last year
- Reverse Engineering 4 Fun & Profit☆24May 27, 2025Updated 9 months ago
- ☆11Jul 28, 2020Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Oct 27, 2023Updated 2 years ago
- Koth - TryHackMe Tricks☆189Nov 5, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆19Aug 5, 2025Updated 7 months ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- may the poc with you☆17May 6, 2022Updated 3 years ago
- ☆16Jul 20, 2025Updated 7 months ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 2 years ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆20Jun 25, 2025Updated 8 months ago
- ☆17Oct 15, 2024Updated last year
- ☆31Aug 13, 2025Updated 6 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆67Feb 5, 2026Updated last month
- ☆15Apr 4, 2022Updated 3 years ago
- Small tool to log HTTP requests for debugging.☆16May 9, 2020Updated 5 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- ☆16Nov 13, 2024Updated last year
- CLI script to use GadgetProbe as a library to generate serialized payloads of DNS callbacks to free DNSbin to probe what Java classpaths …☆14Jun 8, 2021Updated 4 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- ☆17Jul 31, 2021Updated 4 years ago