IppSec / ctf-scripts
Bad scripts I made doing CTF's
☆21Updated last year
Alternatives and similar repositories for ctf-scripts:
Users that are interested in ctf-scripts are comparing it to the libraries listed below
- A cheatsheet for NetExec☆116Updated 2 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 5 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆83Updated 3 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- ☆83Updated 2 months ago
- CLI monitor for windows process- & file activity☆85Updated 4 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago
- ☆58Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆100Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- ☆67Updated last month
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- ☆35Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- ☆38Updated this week
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- My Favorite Offensive Security Scripts☆70Updated last year
- Everything and anything related to password spraying☆133Updated 11 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 10 months ago
- PowerShell Reverse Shell☆61Updated last year
- ☆156Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year