Aravindha1234u / DisCTFLinks
Discord Bot for Realtime Updates from CTFd
☆10Updated 4 years ago
Alternatives and similar repositories for DisCTF
Users that are interested in DisCTF are comparing it to the libraries listed below
Sorting:
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- All kinds of tiny shells☆65Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- Presentaciones de congresos☆55Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- A not-curated list of cloud hacking labs☆26Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated last month
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 3 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆43Updated 6 months ago
- ☆42Updated 3 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆100Updated 4 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 2 months ago
- A Red Teaming tool focused on profiling the target.☆29Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- Creating a ransomware in a minute☆30Updated 2 years ago
- ☆54Updated 11 months ago
- A user enumeration tool for Slack.☆34Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 7 months ago
- A DICOM honeypot for detecting and logging unauthorized access attempts☆47Updated this week