JohnHammond / ctfcli
ctfcli is a tool to manage Capture The Flag events and challenges
☆18Updated last year
Alternatives and similar repositories for ctfcli:
Users that are interested in ctfcli are comparing it to the libraries listed below
- CTFs as you need them☆28Updated last year
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆15Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆32Updated last year
- Tryhackme rooms & tools☆62Updated 4 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- Opening the door, one reverse shell at a time☆183Updated 3 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆16Updated 2 years ago
- ☆76Updated 3 years ago
- This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.☆95Updated 3 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆59Updated 6 years ago
- As requested on YouTube, this is an archive of my Python scripts and code that I've used to solve the Natas challenges from OverTheWire.☆24Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆37Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- OSCP Notes written from PWK Course☆46Updated 3 years ago
- A collection of various capture the flag event write-ups and anomalies☆39Updated 5 years ago
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- Compress a Python script to a command-line one-liner☆76Updated 2 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Updated 4 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- ☆21Updated 2 years ago
- A tool that automates the process of enumeration☆30Updated 4 years ago
- ☆62Updated 4 years ago
- A collection of resources I'm using while working toward the OSCP☆78Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆78Updated 4 years ago
- ☆99Updated 4 years ago
- ☆51Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆180Updated 5 years ago