Kkevsterrr / koth
king of the hill cybersecurity competition
☆28Updated 2 years ago
Alternatives and similar repositories for koth:
Users that are interested in koth are comparing it to the libraries listed below
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆61Updated 8 months ago
- ☆20Updated 3 years ago
- Red team oriented key finder and correlator☆16Updated last year
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- Collection of red machine learning projects☆40Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Continuous kerberoast monitor☆44Updated last year
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Tools that trigger False Positive AV alerts☆44Updated 3 months ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 7 months ago
- ☆10Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆52Updated 5 months ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- wordlists for password cracking☆27Updated 2 years ago
- Manticore Adversary Emulation Cli☆47Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆35Updated 3 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 6 months ago
- pypykatz plugin for volatility3 framework☆39Updated 11 months ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆27Updated 2 years ago