vo1dptr / KOTH
This repository contains a collection of automated scripts ( autopwn ) created for the King of the Hill (KOTH) machines on TryHackMe platform.
☆17Updated last year
Alternatives and similar repositories for KOTH:
Users that are interested in KOTH are comparing it to the libraries listed below
- If you love Linux but can't always carry a laptop/pc with you no worries, I got you a completely web based fully functional web shell.☆9Updated 6 months ago
- Koth - TryHackMe Tricks☆159Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆76Updated last year
- Bookmarklet to find endpoints easily with one click☆48Updated 9 months ago
- my kali desktop setup☆283Updated 8 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆290Updated 5 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆237Updated 5 months ago
- E-books related to hacking helps you to know more about hacking.☆17Updated last year
- Pure Malware Development Resource Collections☆221Updated last month
- WiFi Penetration Testing & Auditing Tool☆463Updated 3 weeks ago
- Manage variables effectively when playing CTFs☆11Updated 9 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆176Updated 4 months ago
- Recolored Kali Linux wallpapers☆119Updated 8 months ago
- ⚠️ malware development☆503Updated 8 months ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆54Updated 11 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆315Updated last month
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆186Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆243Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆278Updated this week
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆265Updated last year
- HTB Certified Penetration Testing Specialist CPTS Study☆108Updated last year
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆12Updated 11 months ago
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆122Updated last week
- Scripts for offensive security☆102Updated last month
- CVE-2024-21413 PoC for THM Lab☆73Updated 11 months ago
- Unveiling the Hidden Layers of the Web – A Comprehensive Web Reconnaissance Tool☆220Updated 2 weeks ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆66Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆93Updated last year
- ☆31Updated last year