IppSec / ctf-scripts
Bad scripts I made doing CTF's
☆21Updated last year
Alternatives and similar repositories for ctf-scripts:
Users that are interested in ctf-scripts are comparing it to the libraries listed below
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆121Updated last year
- A cheatsheet for NetExec☆114Updated last month
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 4 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 9 months ago
- ☆83Updated 2 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated 2 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated 2 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆122Updated last year
- ☆19Updated 11 months ago
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- My Favorite Offensive Security Scripts☆68Updated last year
- Get a reverse shell using PostgreSQL☆17Updated 7 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆180Updated 7 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- TLDRBins is a repo for cybersecurity researchers to quick search for commands.☆13Updated last week
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- Exploit to dump ipmi hashes☆32Updated last year
- Windows Privilege Escalation☆56Updated 2 years ago
- ☆79Updated last month
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆41Updated last month
- ☆38Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- ☆148Updated last year
- ☆34Updated 3 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆101Updated 2 months ago