DarkStar7471 / CTF-OhSINTLinks
Are you able to use open source intelligence to solve this challenge?
☆11Updated 6 years ago
Alternatives and similar repositories for CTF-OhSINT
Users that are interested in CTF-OhSINT are comparing it to the libraries listed below
Sorting:
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Repo for preparing for OSCE but to learn more about exploit development☆12Updated 4 years ago
- Learning a little bit of DevOps and using Infrastructure-as-a-Code tools to automate the creation of the AD lab in TCM Security's course.☆9Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆12Updated 2 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- New Framework Red Team Operations☆18Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆14Updated 4 years ago
- Post-exploitation tool☆26Updated 4 years ago
- ☆29Updated 2 years ago
- Just another vulnerable web application.☆36Updated 11 months ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- ☆38Updated 4 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago