IceCool10 / RBT_CTFLinks
☆11Updated 3 years ago
Alternatives and similar repositories for RBT_CTF
Users that are interested in RBT_CTF are comparing it to the libraries listed below
Sorting:
- ☆53Updated last year
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Simple Live Data Collection Tool☆22Updated 4 years ago
- Red Team Resources☆60Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 5 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Updated 4 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆17Updated 7 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- ☆36Updated 7 years ago
- ☆30Updated 5 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- SNIcat☆127Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆36Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 11 months ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago