Orange-Cyberdefense / ctf-write-upsLinks
Collection of our CTF write-ups
☆29Updated 5 years ago
Alternatives and similar repositories for ctf-write-ups
Users that are interested in ctf-write-ups are comparing it to the libraries listed below
Sorting:
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- My collection of self-written exploits☆24Updated 3 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 11 months ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- ☆48Updated 2 weeks ago
- Posts about different topics☆40Updated last month
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated last week
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated 11 months ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆28Updated 6 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- ☆24Updated 6 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆22Updated 7 years ago
- ☆54Updated 4 years ago