D00Movenok / ctf-participation-bot
✅ CTF participation Telegram Bot
☆14Updated 2 years ago
Alternatives and similar repositories for ctf-participation-bot:
Users that are interested in ctf-participation-bot are comparing it to the libraries listed below
- ☆9Updated 2 months ago
- Useful collection of scapy-scripts and more☆27Updated 9 months ago
- RedTeam network tool based on OrangePi R1☆23Updated 2 months ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Updated 3 years ago
- Nim Shellcode Injector☆13Updated 4 years ago
- Large public A&D training on 2018-11-04☆20Updated 3 years ago
- this is some scripts for pentesting zabbix server☆12Updated 7 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- ☆72Updated last year
- xortigate-cve-2023-27997☆62Updated last year
- Presentaciones de congresos☆52Updated 9 months ago
- A way to use fonts to obfuscate text.☆44Updated 2 years ago
- Developed with ♥ by Hackerdom team☆23Updated last year
- Finding secrets in various (non-text) popular files.☆24Updated 2 months ago
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆21Updated 4 years ago
- exfiltration/infiltration toolkit☆44Updated 5 months ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- HTML Universal Identifier☆64Updated 3 months ago
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- ☆26Updated 2 years ago
- ☆9Updated 2 months ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆47Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- maldev obviously☆26Updated 2 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆12Updated 2 years ago
- Modified version of PEAS client for offensive operations☆40Updated 2 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Shellcode reflective DLL injection in Rust☆20Updated last year