☆66Jan 4, 2020Updated 6 years ago
Alternatives and similar repositories for CTF-scripts
Users that are interested in CTF-scripts are comparing it to the libraries listed below
Sorting:
- Infosec blog☆141Nov 3, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- A web application for generating custom XSS payloads☆78Dec 29, 2019Updated 6 years ago
- Quick binary search for NTLM hash dataset☆19Jan 31, 2019Updated 7 years ago
- This package allows you to check whether an IP address belongs to a hosting provider or not. In case the IP address can be successfully l…☆21Oct 22, 2023Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 9 months ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- ☆12Nov 15, 2021Updated 4 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- A tool that executes any command or application provisioning its environment with variables from providers (like secrets from Vault).☆11Jul 23, 2024Updated last year
- Security challenges and CTFs created by the Penultimate team.☆13Feb 22, 2018Updated 8 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Jan 9, 2019Updated 7 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Jan 10, 2019Updated 7 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Ready to use Openvas (GVM 11) in a Docker container☆13Jul 31, 2020Updated 5 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago