AD related packs are here!
☆16Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Active-Directory
Users that are interested in Active-Directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A self-contained example Ethereum challenge using Paradigm's CTF framework☆32Nov 25, 2022Updated 3 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- National Graduation Exam Score from 2022 to 2024☆11Jul 17, 2024Updated last year
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated last month
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- ☆71Nov 19, 2021Updated 4 years ago
- Gonna share my writeups and resources here☆72Jan 16, 2025Updated last year
- This repository is an interactive collection of my solutions to various XSS challenges.☆13Oct 25, 2020Updated 5 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆19Jan 10, 2025Updated last year
- Official writeups for Hack The Boo CTF 2023☆45Dec 4, 2024Updated last year
- Little Yellow Chicken CTF Writeups☆17Sep 30, 2025Updated 5 months ago
- CTF, wargame cheatsheet☆33Nov 29, 2018Updated 7 years ago
- A collection of shellcode, ripped straight from the shell-storm database. We host this just for easy access, since shell-storm cannot be …☆23Sep 27, 2016Updated 9 years ago
- MCP server for merging multiple files into one☆25Sep 6, 2025Updated 6 months ago
- Example of how you can create your own dojo☆12Sep 2, 2025Updated 6 months ago
- ☆63Jul 14, 2025Updated 8 months ago
- Flipper Zero alternative built for ESP32-S3☆15Nov 19, 2023Updated 2 years ago
- ☆35Oct 6, 2025Updated 5 months ago
- LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling you…☆13Mar 4, 2026Updated 3 weeks ago
- RootersCTF 2019 challenges☆18Oct 12, 2019Updated 6 years ago
- A configurable colourful terminal clock☆15Jan 13, 2021Updated 5 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated 11 months ago
- Developing an open source Windows EDR written in C & C++ & C#☆28Updated this week
- ☆17Jan 27, 2022Updated 4 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆11Apr 5, 2023Updated 2 years ago
- ☆26Feb 21, 2026Updated last month
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- 基于bpmn 2.0协议实现的工作流引擎☆12Jan 17, 2024Updated 2 years ago
- Basic Psexec clone, but in golang.☆17Jul 2, 2022Updated 3 years ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 11 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 2 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 10 months ago
- ☆15Aug 6, 2021Updated 4 years ago
- Linux process injection PoCs☆29Apr 30, 2024Updated last year