Edd13Mora / RedFlagsLinks
☆14Updated 2 years ago
Alternatives and similar repositories for RedFlags
Users that are interested in RedFlags are comparing it to the libraries listed below
Sorting:
- A really good cybersec reading materials.☆13Updated 3 years ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆24Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- offensive security scripts and documentation☆29Updated last week
- Notes Template/Checklist for PEN-300 OSEP☆16Updated 4 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- Stack Based buffer overflow attack☆19Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- SecDojo 23jan CTF writeup.☆15Updated 3 years ago
- ☆44Updated 2 years ago
- Offensive Security OSWE Prep 2022☆75Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆149Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- AV Evasion Techniques☆81Updated 3 years ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- ☆27Updated 3 years ago
- ☆38Updated 3 years ago
- ☆71Updated 8 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- ☆19Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- My Collection of exploits, reverse shells, scripts and more☆14Updated 2 years ago
- CLI monitor for windows process- & file activity☆94Updated 5 years ago