┌──────────────────────────────────────────────────────────────────────┐
│ Handle : 0xb0rn3 / 0xbv1 │
│ Platform : TryHackMe (active) · HackTheBox (incoming) │
│ Mission : Automate every step of every exploitation chain │
│ Output : Standalone autopwn scripts, fully auditable, timestamped │
└──────────────────────────────────────────────────────────────────────┘
Each script is a standalone autopwn — not a general-purpose tool. It encodes the exact steps a specific room requires and runs them hands-free from recon to root.
Recon ──► Enumeration ──► Initial Access ──► Post-Exploitation ──► Flag(s)
# 1. Clone the repo
git clone https://github.com/0xb0rn3/CTFS.git
# 2. Navigate to the room
cd CTFS/THM/<room>/
# 3. Make executable & run
chmod +x <script>
./<script>
# Scripts auto-detect tun0 VPN IP and prompt for target IP.
# Connect to platform VPN before running.💡 All output (scan results, payloads, flags) is saved to a timestamped directory — runs are fully auditable.
| Tool | Role | Auto-install |
|---|---|---|
| Port scanning & service detection | ✅ | |
| Directory & file enumeration | ✅ | |
| HTTP interaction & payload delivery | ✅ | |
| Reverse shell listeners | ✅ | |
| Exploit scripting | ✅ | |
| C exploit compilation | ✅ |
Auto-install supported on Arch Linux and Debian/Ubuntu systems.
╔══════════════════════════════════════════════════════════════════╗
║ All scripts target intentionally vulnerable CTF environments. ║
║ For authorized use on platforms you are subscribed to only. ║
║ Do NOT run against systems you do not own or have explicit ║
║ written permission to test. ║
╚══════════════════════════════════════════════════════════════════╝