CTFCircle / CTF-Circle-Resources
CTF-Circle Resources for CTFs and other things
☆15Updated 6 years ago
Alternatives and similar repositories for CTF-Circle-Resources:
Users that are interested in CTF-Circle-Resources are comparing it to the libraries listed below
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- ☆26Updated 7 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 7 months ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- Find potential Indicators of Compromise among similar Linux servers☆29Updated 7 years ago
- penetration testing scripts☆136Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- ☆52Updated 4 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- ☆73Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Some of the scripts I use.☆41Updated 7 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 8 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- ☆92Updated 6 years ago
- ☆51Updated 8 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- "Honey" document generator for beacon document tracking.☆56Updated 6 years ago
- The documents☆55Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Some PowerShell Defensive Scripts☆127Updated 8 years ago