☆19Oct 28, 2018Updated 7 years ago
Alternatives and similar repositories for CTF-2018
Users that are interested in CTF-2018 are comparing it to the libraries listed below
Sorting:
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Zeek package to create JSON formatted logs to stream into data analysis systems.☆30Dec 3, 2025Updated 3 months ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- A tool to take Web page screenshots with common browser screen resolutions and save them as PNG files.☆67Apr 24, 2017Updated 8 years ago
- Ruins & Riches Ultima Online Server Files☆10Oct 15, 2023Updated 2 years ago
- See more current version at https://github.com/ElectionDataAnalysis/election_data_analysis/☆10Jul 6, 2023Updated 2 years ago
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- Examples of various Ansible Playbooks for Microsoft Windows Server 2016☆10Mar 3, 2019Updated 7 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- CyberArk Credentials Provider (CCP) Plugin for HashiCorp Vault☆17Jan 12, 2024Updated 2 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- SDK for the Puzzle Wallet☆11Aug 12, 2025Updated 6 months ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆19Oct 24, 2025Updated 4 months ago
- Create a new Windows VM on a standalone ESX host☆12Jan 1, 2021Updated 5 years ago
- ☆43Jun 4, 2014Updated 11 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Automated CyberArk Privileged Session Manager SSH Proxy Installer.☆13Apr 14, 2023Updated 2 years ago
- C Bindings to BAP☆16Jul 13, 2022Updated 3 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- PowerShell scripts and functions aimed at CyberArk management☆12Jul 28, 2025Updated 7 months ago
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- Bro Detection Scripts☆10Mar 9, 2021Updated 4 years ago
- CyberArk Identity API PowerShell Module☆11Apr 15, 2025Updated 10 months ago
- A Centralized Wiki for CTF Organization☆10Sep 22, 2021Updated 4 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- A self-serve automated SSH CA implemented as an SSH forced command☆13Sep 21, 2018Updated 7 years ago
- Steam scripts for Outlands shard☆10Feb 15, 2020Updated 6 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- [deprecated] ARM mbed based low-level firmware for ROSbot 2.0 for STM32F4 microcontroller☆10Apr 21, 2021Updated 4 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago