Orange-Cyberdefense / ctf-write-upsLinks
 Collection of our CTF write-ups
☆29Updated 5 years ago
Alternatives and similar repositories for ctf-write-ups
Users that are interested in ctf-write-ups are comparing it to the libraries listed below
Sorting:
- My collection of self-written exploits☆24Updated 3 years ago
 - Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
 - A library to enhance and speed up script/exploit writing for CTF players☆42Updated 5 years ago
 - ☆22Updated 7 years ago
 - Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
 - Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
 - Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
 - Get GTFOBins info about a given exploit from the command line☆40Updated last year
 - A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
 - cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
 - Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated last month
 - Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
 - Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
 - Empower your enumeration during OSCP☆36Updated 6 years ago
 - Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
 - ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
 - Commands used in Windows penetration tests☆54Updated last week
 - Collection of my slide decks, conference videos and research white papers☆27Updated last month
 - autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
 - Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 3 years ago
 - Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
 - Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
 - ☆24Updated 4 months ago
 - Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
 - An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 11 months ago
 - Offensive Security Wireless Professional☆17Updated 5 years ago
 - A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆62Updated 5 years ago
 - Extract credentials from lsass remotely☆16Updated 5 years ago
 - Write-Ups for TryHackMe☆24Updated 4 years ago
 - New Framework Red Team Operations☆19Updated 4 years ago