All Projects β†’ 7h3rAm β†’ machinescli

7h3rAm / machinescli

Licence: other
This tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to machinescli

writeups
Writeups for vulnerable machines.
Stars: ✭ 110 (+223.53%)
Mutual labels:  ctf, writeups, vulnhub, offsec, oscp, hackthebox, tryhackme
haiti
πŸ”‘ Hash type identifier (CLI & lib)
Stars: ✭ 287 (+744.12%)
Mutual labels:  ctf, hackthebox, tryhackme
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-14.71%)
Mutual labels:  vulnhub, hackthebox, tryhackme
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-26.47%)
Mutual labels:  vulnhub, hackthebox, tryhackme
Privilege Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+6126.47%)
Mutual labels:  ctf, vulnhub, oscp
doubletap
A very loud but fast recon scan and pentest template creator for use in CTF's/OSCP/Hackthebox...
Stars: ✭ 23 (-32.35%)
Mutual labels:  ctf, oscp, hackthebox
Cryptography Writeups
Cryptography & CTF Writeups
Stars: ✭ 54 (+58.82%)
Mutual labels:  ctf, writeups
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-20.59%)
Mutual labels:  ctf, oscp
CTF-Script-And-Template-Thrift-Shop
[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half thi…
Stars: ✭ 38 (+11.76%)
Mutual labels:  ctf, hackthebox
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+1114.71%)
Mutual labels:  ctf, oscp
Ctf Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+894.12%)
Mutual labels:  ctf, oscp
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+3055.88%)
Mutual labels:  ctf, oscp
HackTheBox-Writeups
No description or website provided.
Stars: ✭ 94 (+176.47%)
Mutual labels:  writeups, hackthebox
Oscp Pentest Methodologies
倇考 OSCP ηš„ε„η§εΉ²θ΄§θ΅„ζ–™/渗透桋试干货衄料
Stars: ✭ 166 (+388.24%)
Mutual labels:  ctf, oscp
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+311.76%)
Mutual labels:  writeups, tryhackme
Vulnhub Ctf Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Stars: ✭ 368 (+982.35%)
Mutual labels:  ctf, oscp
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+5652.94%)
Mutual labels:  oscp, hackthebox
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (+35.29%)
Mutual labels:  offsec, oscp
Oscp Ctf
oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or playing around with CTFs.
Stars: ✭ 62 (+82.35%)
Mutual labels:  ctf, oscp
noxCTF-2018-PSRF-as-Pwn
No description or website provided.
Stars: ✭ 50 (+47.06%)
Mutual labels:  ctf, writeups

machinescli

License: CC BY-SA 4.0

This tool provides commandline access for HackTheBox, TryHackMe and VulnHub machines. Here's a quick listing of useful features:

  • Look up machine details across HTB/THM/VH
  • Track owned/pending/todo machines
  • Interact with HTB portal and assign/remove/own/query machines
  • Search writeup descriptions using ippsec.rocks like option
  • Search machine details using jq-style query language

machinescli works in conjuction with svachal framework. As such, if you wish to extend and use writeup metadata, it will be natively accessible via the shared machines.json file.

Installation

Follow the steps below and run machinescli to create the machines.json file (to get your HTBAPIKEY from HackTheBox, go to your username tab > Classic HTB > Settings > API Key):

$ mkdir -pv cd $HOME/toolbox/projects && cd $HOME/toolbox/projects
$ git clone https://github.com/7h3rAm/machinescli && cd machinescli
$ python3 -m venv --copies venv
$ source venv/bin/activate
$ pip install -r requirements.txt
$ mkdir -pv $HOME/toolbox/bootstrap # this directory will be used to store and access machines.json file
$ export HTBAPIKEY=<APIKEYHERE>
$ python3 machinescli.py --update

Usage

Usage

Usecases

  1. Show counts for tracked and owned machines: Counts

  2. Show stats for machine named bashed, show extended details as JSON, export results for GSheet import: Info

  3. Search machine descriptions for keywords buffer overflow and bash: Search

  4. Query owned machines using the built-in filter: Query-Owned

  5. Query owned AND oscplike HackTheBox machines using the built-in filter: Query-OwnedHTB

  6. Query owned AND oscplike HackTheBox machines using the built-in filter and show TTPs if machine writeups are available: Query-OwnedHTB

  7. Query owned AND NOT OSCPlike machines using jq-style syntax: QueryJQ

  8. Show global stats from HackTheBox platform: HTB-Stats

  9. Show spawned machines and expiry stats from HackTheBox platform: HTB-Spawned-Expiry

  10. Perform assign and remove operations on a HackTheBox machine: HTB-Assign-Remove

  11. Show global stats from TryHackMe platform: THM-Stats

Argument Autocomplete

Source the .bash-completion file within a shell to trigger auto-complete for arguments. This will require the following alias:

alias machinescli='python3 $HOME/toolbox/projects/machinescli/machinescli.py'

You will need a Nerd Fonts patched font for OS icons and other symbols to be rendered correctly.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].