Orange-Cyberdefense / ctf-partyLinks
A library to enhance and speed up script/exploit writing for CTF players
☆40Updated 4 years ago
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- Collection of our CTF write-ups☆29Updated 4 years ago
- ☆51Updated 2 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Code snippets I find useful☆31Updated 7 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Some of my flag protected writeups☆11Updated 5 years ago
- ☆28Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆28Updated 4 months ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago