DarkStar7471 / CTF-OhSINT
Are you able to use open source intelligence to solve this challenge?
☆11Updated 5 years ago
Alternatives and similar repositories for CTF-OhSINT:
Users that are interested in CTF-OhSINT are comparing it to the libraries listed below
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆24Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A tool for simplifying the process of researching IOCs.☆24Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆21Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Pentesting notes☆17Updated last year
- A ping detection tool for linux☆24Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Learning a little bit of DevOps and using Infrastructure-as-a-Code tools to automate the creation of the AD lab in TCM Security's course.☆9Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- ☆28Updated last year
- Automated Recon Framework☆24Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- ☆14Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- ☆12Updated 2 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 3 years ago
- CVE, reports, research☆17Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago