The source files of my completed TryHackMe challenges and walkthroughs with links to their respective rooms
β35Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for TryHackMe
Users that are interested in TryHackMe are comparing it to the libraries listed below
Sorting:
- The entire walkthrough of all my resolved TryHackMe roomsβ71May 24, 2023Updated 2 years ago
- π TryHackMe - Home Work ! πβ45Dec 19, 2024Updated last year
- Paros proxy serverβ11Feb 21, 2014Updated 12 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3β26Aug 4, 2023Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OSβ22Oct 21, 2023Updated 2 years ago
- Patch-Diffusion Code (AAAI2022)β13Mar 3, 2022Updated 4 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.ioβ13Jun 25, 2020Updated 5 years ago
- kidney function classification and prediction through ultrasound-based kidney imaging: from deep learning to mass screening of chronic kiβ¦β12May 20, 2019Updated 6 years ago
- β44Mar 8, 2026Updated 2 weeks ago
- Joint adjustment image steganography networksβ10Aug 3, 2023Updated 2 years ago
- Compiled binaries of various security toolsβ14May 19, 2021Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.β10Mar 25, 2018Updated 7 years ago
- β11Mar 12, 2025Updated last year
- Notes on Active Directory analysis and exploitationβ11Mar 7, 2019Updated 7 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.β18Dec 21, 2024Updated last year
- This program can encrypt secret messages using a combination of RC4 and base 64 cryptographic algorithms then insert them into image fileβ¦β10Jan 22, 2020Updated 6 years ago
- Hide a Secret Message in an Image (Steganography)β14Apr 24, 2020Updated 5 years ago
- Pulsar: Secure Steganography for Diffusion Modelsβ15Oct 15, 2024Updated last year
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutionsβ10May 10, 2024Updated last year
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"β13Oct 19, 2023Updated 2 years ago
- Collection of the cheat sheets useful for pentestingβ10May 11, 2018Updated 7 years ago
- CVE-2020-25223β11Sep 13, 2021Updated 4 years ago
- β20Aug 19, 2024Updated last year
- Describe how to use ffuf different options with examplesβ13Jun 13, 2022Updated 3 years ago
- All Solutionsβ202May 19, 2024Updated last year
- My CTF write-ups!β26Dec 22, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilitiesβ10Jul 6, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rulesβ14Oct 20, 2022Updated 3 years ago
- Personal repository with handy cheatsheets.β16Oct 23, 2016Updated 9 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)β17May 25, 2020Updated 5 years ago
- Search Termux Commands and Guide in Termux !!β11Apr 29, 2022Updated 3 years ago
- Source code of https://blahcat.github.ioβ13Oct 6, 2025Updated 5 months ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabilβ¦β30Feb 4, 2022Updated 4 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]β32Jun 2, 2024Updated last year
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tranβ14May 27, 2023Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.β10Dec 29, 2020Updated 5 years ago
- Launch your SOC as fast as a rocket with only one commandβ12Feb 17, 2025Updated last year
- My (newer) Emacs configurationβ14Sep 14, 2025Updated 6 months ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.β12Oct 25, 2025Updated 4 months ago