Orange-Cyberdefense / ctf-write-ups
Collection of our CTF write-ups
☆29Updated 4 years ago
Alternatives and similar repositories for ctf-write-ups:
Users that are interested in ctf-write-ups are comparing it to the libraries listed below
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- My collection of self-written exploits☆21Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Posts about different topics☆36Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Anonymize your hashcat formatted files for online cracking☆29Updated 5 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆37Updated last year
- ☆28Updated 2 months ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- A tool to password spray Jenkins instances☆55Updated 5 years ago
- ☆14Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- ☆29Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago