HHousen / PicoCTF-2022Links
Hayden Housen's solutions to the 2022 PicoCTF Competition
☆10Updated 3 years ago
Alternatives and similar repositories for PicoCTF-2022
Users that are interested in PicoCTF-2022 are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Updated 3 years ago
- PHP lab to test captcha bypassing☆30Updated 2 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Updated 4 years ago
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Updated last year
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Command line client for HackTheBox☆25Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 10 months ago
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last month
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Hackthebox tools☆12Updated 6 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆48Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Updated last year
- ☆27Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year