1337list / ephemera-miscellanyLinks
Ephemera and other documentation associated with the 1337list project.
☆395Updated 7 years ago
Alternatives and similar repositories for ephemera-miscellany
Users that are interested in ephemera-miscellany are comparing it to the libraries listed below
Sorting:
- CTFs, solutions and presentations☆292Updated last month
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆317Updated 6 years ago
- Various Tools and Docker Images☆280Updated 5 months ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Updated 7 years ago
- Red Team Tactics, Techniques, and Procedures☆416Updated this week
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 6 years ago
- Kinda useful notes collated together publicly☆497Updated 6 years ago
- OPCDE Cybersecurity Conference Materials☆617Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆397Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆384Updated 5 years ago
- Resource for developing infosec skills for OSCP☆115Updated last year
- Interview questions to screen offensive (red team/pentest) candidates☆883Updated 6 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Updated 6 years ago
- Repo containing links to all CTF Challenges used in the 2015 MITRE CTF.☆14Updated 7 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 7 years ago
- Open source offensive security platform for red team, by red team.☆387Updated 7 years ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆230Updated 3 years ago
- Issues to consider when planning a red team exercise.☆617Updated 8 years ago
- Post Exploitation Wiki☆522Updated 5 years ago
- Some security related notes☆461Updated 8 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- ☆508Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆236Updated 7 months ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- ☆39Updated 5 years ago
- Scoreboard for Capture The Flag competitions.☆171Updated 3 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆327Updated 4 years ago