Skip to content

0xb0rn3/CTFS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 

Repository files navigation

Typing animation

Author Instagram X / Twitter


THM CTFs

HTB Status


Subtitle

> whoami

┌──────────────────────────────────────────────────────────────────────┐
│  Handle  : 0xb0rn3 / 0xbv1                                          │
│  Platform : TryHackMe (active) · HackTheBox (incoming)              │
│  Mission  : Automate every step of every exploitation chain          │
│  Output   : Standalone autopwn scripts, fully auditable, timestamped │
└──────────────────────────────────────────────────────────────────────┘

Each script is a standalone autopwn — not a general-purpose tool. It encodes the exact steps a specific room requires and runs them hands-free from recon to root.

Recon ──► Enumeration ──► Initial Access ──► Post-Exploitation ──► Flag(s)

> ls -la ./THM/

🟣 TryHackMe — Active


Browse THM Scripts


Browse typing

> ls -la ./HTB/

🟢 HackTheBox — Incoming


HTB incoming

HTB Status


> cat USAGE.md

# 1. Clone the repo
git clone https://github.com/0xb0rn3/CTFS.git

# 2. Navigate to the room
cd CTFS/THM/<room>/

# 3. Make executable & run
chmod +x <script>
./<script>

# Scripts auto-detect tun0 VPN IP and prompt for target IP.
# Connect to platform VPN before running.

💡 All output (scan results, payloads, flags) is saved to a timestamped directory — runs are fully auditable.


> cat REQUIREMENTS.md

Tool Role Auto-install
nmap Port scanning & service detection
gobuster Directory & file enumeration
curl HTTP interaction & payload delivery
nc Reverse shell listeners
python3 Exploit scripting
gcc C exploit compilation

Auto-install supported on Arch Linux and Debian/Ubuntu systems.


> cat DISCLAIMER.txt

╔══════════════════════════════════════════════════════════════════╗
║  All scripts target intentionally vulnerable CTF environments.  ║
║  For authorized use on platforms you are subscribed to only.    ║
║  Do NOT run against systems you do not own or have explicit     ║
║  written permission to test.                                    ║
╚══════════════════════════════════════════════════════════════════╝

TryHackMe GitHub Instagram X


Footer typing

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors