Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆32Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆53Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- A repo to support the book☆110Updated 4 years ago
- ☆64Updated last year
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- ☆117Updated 8 months ago
- Tools that trigger False Positive AV alerts☆53Updated 11 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- Vulnerabilities, exploits, and PoCs☆37Updated last month
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- SNIcat☆128Updated 4 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 2 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆114Updated 4 years ago
- Local Privilege Escalation Miner☆31Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Updated 3 years ago
- Posts about different topics☆40Updated 3 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆47Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago