Lists (3)
Sort Name ascending (A-Z)
Starred repositories
Interact with Hackthebox using your terminal - Be faster and more competitive !
A list of all Active Directory machines from HackTheBox
PeTeReport is an open-source application vulnerability reporting tool.
Red Teaming Tactics and Techniques
Aria is Your AI Research Assistant Powered by GPT Large Language Models
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
daloRADIUS is an advanced RADIUS web management application for managing hotspots and general-purpose ISP deployments. It features user management, graphical reporting, accounting, a billing engine…
Useful scripts to exploit Hack The Box retired machines/challenges
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
HTB Pro labs writeup Dante, Offshore, RastaLabs, Cybernetics, APTLabs
The ultimate WinRM shell for hacking/pentesting
A collection of tools that I use in CTF's or for assessments
Next Generation NetMap: A solution designed to circumvent IDS, IPS, WAF. It scans ports and communication stacks by leveraging TCP/IP design vulnerabilities in accordance with RFC standards, with b…
the autonomous implementation of ChatGPT is being touted as "empowering GPT
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
One rule to crack all passwords. or atleast we hope so.
This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_URL, https://freedium.cfd/Medium_URL
A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy tra…
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
CTF framework and exploit development library
Solutions to CTF challenges from PicoCTF, HackTheBox, TryHackMe, and more.