Hamza-Megahed / CTFs
Walkthrough some CTFs
☆48Updated 3 years ago
Related projects: ⓘ
- ☆40Updated this week
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 7 years ago
- ☆58Updated this week
- ☆84Updated this week
- Miscellaneous pentesting scripts for OSCP☆57Updated 5 years ago
- ☆52Updated 4 years ago
- ☆115Updated this week
- ☆36Updated this week
- ☆30Updated this week
- Hacking challenges☆32Updated 6 years ago
- Linux pentest tools☆86Updated 4 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- ☆57Updated this week
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- ☆40Updated this week
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 10 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- ☆138Updated 7 years ago
- ☆51Updated 8 years ago
- ☆122Updated 6 years ago
- ☆57Updated this week
- ☆81Updated this week
- ☆61Updated this week
- ☆97Updated this week
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆126Updated 6 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- WhiteBox CMS analysis☆68Updated last year
- Script to test for default Knockd configurations to identify hidden remote services |☆35Updated 9 years ago