OlivierLaflamme / CTF-Script-And-Template-Thrift-ShopView external linksLinks
[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half t…
☆63May 19, 2023Updated 2 years ago
Alternatives and similar repositories for CTF-Script-And-Template-Thrift-Shop
Users that are interested in CTF-Script-And-Template-Thrift-Shop are comparing it to the libraries listed below
Sorting:
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Side Channel script☆25Mar 1, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 10 months ago
- ☆11Nov 12, 2023Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 4 years ago
- My CTF writeups☆102Nov 24, 2024Updated last year
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 3 years ago
- macOS from a blue perspective 🧢☆14Apr 13, 2023Updated 2 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- A small collection of AWS utilities, packaged as a single standalone binary.☆13Aug 23, 2023Updated 2 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated 3 weeks ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆60Feb 9, 2021Updated 5 years ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Jailbreaker!!!☆16Mar 7, 2019Updated 6 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- Tool of the buttons for quick search keywords ans hashtags in 70 different social media platforms☆46Sep 7, 2023Updated 2 years ago
- A tool to easily archive CTFd sites to GitHub Pages☆45Feb 3, 2026Updated 2 weeks ago
- Some wordpress user enumeration scripts.☆38Dec 21, 2016Updated 9 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆141Mar 10, 2021Updated 4 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 3 years ago