Blackslashtech / glitch
General purpose attack-defense range for zero-config deployment
☆14Updated 2 weeks ago
Related projects: ⓘ
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆43Updated 10 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆88Updated last month
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆51Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆121Updated 3 months ago
- A curated list of resources for the OSED journey.☆55Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆43Updated 9 months ago
- Malware As A Service☆117Updated 6 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆23Updated last year
- Repo of RIT CCDC Team Scripts☆14Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆61Updated last week
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆86Updated last month
- ☆102Updated 2 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆37Updated last year
- https://notes.vulndev.io/☆26Updated 8 months ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- ☆171Updated last month
- ☆119Updated last month
- Artifact monitoring that ensures fairplay☆66Updated 11 months ago
- Ping-based Information Lookup and Outbound Transfer☆70Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆51Updated last month
- pysnaffler☆83Updated last month
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- vulnerable windows binaries for exploitation practice☆33Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆50Updated last month
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆40Updated 4 years ago
- ☆147Updated 5 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆12Updated 6 months ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆33Updated 2 years ago