D00Movenok / ctf-participation-botLinks
✅ CTF participation Telegram Bot
☆14Updated 2 years ago
Alternatives and similar repositories for ctf-participation-bot
Users that are interested in ctf-participation-bot are comparing it to the libraries listed below
Sorting:
- RedTeam network tool based on OrangePi R1☆23Updated 4 months ago
- ☆40Updated last week
- ☆72Updated last year
- Nim Shellcode Injector☆15Updated 4 years ago
- Useful collection of scapy-scripts and more☆28Updated last year
- Finding secrets in various (non-text) popular files.☆25Updated 5 months ago
- ☆43Updated 3 months ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆28Updated last year
- exfiltration/infiltration toolkit☆45Updated 7 months ago
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆20Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆13Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 3 years ago
- this is some scripts for pentesting zabbix server☆12Updated 7 years ago
- My dotfiles for Linux boxes☆55Updated this week
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- Rusty Impersonate☆96Updated 2 years ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- Presentaciones de congresos☆53Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆36Updated 2 years ago
- ☆120Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago
- Large public A&D training on 2018-11-04☆21Updated 4 years ago
- xortigate-cve-2023-27997☆64Updated last year
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆15Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated 2 years ago
- ☆42Updated 5 years ago
- A (small) web exploit framework☆92Updated this week
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago