System Online

STRYKR

Offensive Security Knowledge Base

A unified intelligence platform built from 509 HackTheBox machine writeups and 3,673 disclosed HackerOne vulnerability reports. Search attack patterns, browse exploit scripts, and study real-world security findings in one place.

0 HTB Machines
0 H1 Reports
0 Exploit Scripts
0 Commands
0 Bounties Paid ($)
Enter Knowledge Base

Built for Offensive Security

Every data point extracted, normalized, and indexed for rapid lookup.

509 HTB Machines
Full writeup data for every box: OS, difficulty, ports, services, tools used, CVEs, Metasploit modules, and complete attack chains from enumeration to root.
3,673 HackerOne Reports
Disclosed vulnerability reports with weakness classifications, affected programs, asset details, CVE mappings, and $2.8M in bounty data.
2,052 Exploit Scripts
Inline and standalone scripts across 14 categories: reverse shells, privilege escalation, credential extraction, deserialization, brute force, and more.
29 Attack Archetypes
Recurring attack patterns distilled from hundreds of boxes. Know which tools, ports, and escalation paths are most common for each OS and foothold type.
Full-Text Search
FTS5-powered search across boxes, vulnerability reports, and script source code. Find anything by keyword, CVE, tool name, or technique.
Live API Backend
18 REST endpoints powered by Flask + SQLite3. Paginated queries, filter by OS, difficulty, weakness type, program, language. Real-time data, not static snapshots.

What the Numbers Say

Top vectors, tools, and vulnerability patterns extracted from real-world engagements.

Top Foothold Vectors

Top Privilege Escalation

Top HackerOne Weakness Types

Most Used Pentest Tools

Ready to Explore?

Charts. Tables. Full-text search. Every data point at your fingertips.

Launch Dashboard