JohnHammond / pcdc2019Links
This is a repository to house convenient things for the 2019 PCDC competition.
☆13Updated 6 years ago
Alternatives and similar repositories for pcdc2019
Users that are interested in pcdc2019 are comparing it to the libraries listed below
Sorting:
- Simple Live Data Collection Tool☆22Updated 5 years ago
- ☆15Updated 4 years ago
- Windows stuff☆16Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Updated 6 years ago
- Work in Progress repo☆15Updated 6 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 8 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- My collection of self-written exploits☆24Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- ☆18Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering