DarkStar7471 / CTF-OhSINT
Are you able to use open source intelligence to solve this challenge?
☆11Updated 6 years ago
Alternatives and similar repositories for CTF-OhSINT:
Users that are interested in CTF-OhSINT are comparing it to the libraries listed below
- New Framework Red Team Operations☆17Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A ping detection tool for linux☆24Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- ☆13Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Reverse Shell troll software☆12Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆12Updated 4 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆22Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Noob Penetration tester☆11Updated 10 months ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- ☆29Updated 2 years ago