InfamousSYN / Cookbook-CTF
CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms
☆12Updated 9 years ago
Alternatives and similar repositories for Cookbook-CTF:
Users that are interested in Cookbook-CTF are comparing it to the libraries listed below
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Websocket based egress tester☆20Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆73Updated 2 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 9 months ago
- Babel Scripting Framework☆42Updated 4 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- Some simple and useful tools☆15Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆50Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- ☆112Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Projects and POCs☆59Updated 10 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago