☆157Nov 16, 2025Updated 4 months ago
Alternatives and similar repositories for hackthebox
Users that are interested in hackthebox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago
- vulnerable windows binaries for exploitation practice☆47Jun 6, 2022Updated 3 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- View emails in Discord using Cloudflare Email Routing☆10Dec 15, 2023Updated 2 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- ☆13Feb 7, 2020Updated 6 years ago
- Write and execute PHP with only 6 different characters: ([.^])☆20Sep 5, 2021Updated 4 years ago
- De4dot MOD with few unpackers added☆14Oct 11, 2016Updated 9 years ago
- A python script to hide information over an audio file in .wav format☆19Oct 7, 2017Updated 8 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- Install any apk into dual app space☆27Jan 28, 2022Updated 4 years ago
- Simple GUI app to simplify manual string decryption with de4dot☆27Jan 25, 2022Updated 4 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- de4dot fixed to handle "anti-de4dot" interface adder☆33Jun 6, 2020Updated 5 years ago
- Twin-Hex Cipher Encoder/Decoder☆21Jul 23, 2023Updated 2 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆18Apr 8, 2024Updated last year
- Edit text anywhere on Wayland with Neovim.☆15Sep 17, 2025Updated 6 months ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆168Jan 30, 2021Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- A script for brute forcing Roku TVs and installing applications remotely.☆12Mar 25, 2023Updated 2 years ago
- MacOS Portfolio built with Vue.js☆19Jun 25, 2021Updated 4 years ago
- Telegram Group Manager Bot Written In Python Using Pyrogram.☆12Aug 25, 2023Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Jul 6, 2020Updated 5 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- Oh My Zsh theme based on Parrot OS bash theme☆14Nov 10, 2023Updated 2 years ago
- ☆12Oct 18, 2021Updated 4 years ago
- A customized mixed PT-BR wordlist for pentesting purposes.☆14Apr 14, 2019Updated 6 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- Trace a program using CPU tracer technology.☆27Nov 9, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- A script that can be used to flood a phishing website with useless information.☆12Oct 2, 2020Updated 5 years ago
- Automatically look for paramater reflections in the HTTP response☆17Apr 30, 2025Updated 10 months ago