D00Movenok / ctf-participation-botLinks
✅ CTF participation Telegram Bot
☆14Updated 3 years ago
Alternatives and similar repositories for ctf-participation-bot
Users that are interested in ctf-participation-bot are comparing it to the libraries listed below
Sorting:
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 4 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Updated 3 years ago
- Useful collection of scapy-scripts and more☆32Updated last year
- ☆39Updated 5 years ago
- Nim Shellcode Injector☆15Updated 4 years ago
- Tool for pivoting over SMB pipes☆18Updated 6 years ago
- NTLMRelay for MS Exchange☆11Updated 7 years ago
- xortigate-cve-2023-27997☆65Updated 2 years ago
- this is some scripts for pentesting zabbix server☆13Updated 7 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 6 months ago
- ☆11Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Updated 2 years ago
- ☆73Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Updated 10 months ago
- ☆16Updated 3 years ago
- ☆15Updated 6 months ago
- ☆15Updated last year
- inject and run code into arbitrary process (x86 and x64)☆14Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆28Updated 6 years ago
- Chrome Password Decryptor☆26Updated 4 years ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- Retrieve host information from NTLM☆32Updated 4 years ago
- ☆27Updated 3 years ago
- Presentaciones de congresos☆55Updated last year
- ☆18Updated 10 months ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago