CTFd / snicatLinks
TLS & SNI aware netcat
☆44Updated 10 months ago
Alternatives and similar repositories for snicat
Users that are interested in snicat are comparing it to the libraries listed below
Sorting:
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆49Updated last year
- Community documentation for known Hack The Box v4 API endpoints☆25Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 2 years ago
- Command line client for HackTheBox☆23Updated last year
- A script to download all the challenges and files from the CTFd instance.☆58Updated 2 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆48Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆138Updated 10 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆153Updated 9 months ago
- Web interface to explore Suricata EVE outputs☆67Updated last week
- Run several volatility plugins at the same time☆114Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆55Updated 2 years ago
- Official writeups for Hack The Boo CTF 2023☆45Updated 9 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆70Updated 8 months ago
- Upload files done during my research.☆164Updated 4 months ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆91Updated 2 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆85Updated 2 months ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆113Updated 4 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- Tunneling and Port Forwarding Cheat Sheet☆157Updated 2 years ago
- A directory of cheat sheets to use with TLDR, cheat.sh, or Navi☆18Updated 7 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- Dumps Salesforce objects if provided with credentials.☆12Updated last month
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Damn Vulnerable CICS Application☆27Updated last year
- PCAP visualization tool☆103Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆151Updated 9 months ago