Game of Thrones hacking CTF (Capture the flag)
☆64Mar 7, 2025Updated last year
Alternatives and similar repositories for game-of-thrones-hacking-ctf
Users that are interested in game-of-thrones-hacking-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Sep 7, 2019Updated 6 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- free exploit framework written use python language version 3.3☆31Mar 31, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Plugins for airgeddon☆85Updated this week
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Apr 24, 2018Updated 8 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/ …☆10Mar 15, 2019Updated 7 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆86Oct 27, 2023Updated 2 years ago
- Utility that can be used to decrypt HPQPswd encrypted passwords.☆45Jan 28, 2023Updated 3 years ago
- Useful related to airgeddon packages for Debian based Linux distributions☆59Apr 22, 2026Updated 3 weeks ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 6 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Krack POC☆126Apr 24, 2018Updated 8 years ago
- with metasploit☆63Apr 19, 2020Updated 6 years ago
- Security challenges and CTFs created by the Penultimate team.☆14Feb 22, 2018Updated 8 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆132Jan 11, 2026Updated 4 months ago
- airgeddon-plugins☆18Jan 8, 2026Updated 4 months ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Burp Bounty profiles compilation, feel free to contribute!☆150Sep 24, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- networked status aggregator sees all☆14Apr 26, 2021Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 8 months ago
- Exploit for win10 SMB3.1☆17Apr 5, 2020Updated 6 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- Python module to get and analyze data from Binance very easily.☆25Mar 14, 2026Updated 2 months ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- 蜜罐捕获的数据☆12May 16, 2016Updated 10 years ago
- a time tracker to avoid slacking (firefox plugin)☆11Feb 4, 2015Updated 11 years ago
- A README.md compilation of useful links for CS students. These range from building cool projects, recruiting, and other random CS-related…☆12Jul 6, 2018Updated 7 years ago
- RndPhrase: Auto-generated secure passwords.☆21May 4, 2016Updated 10 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Jul 26, 2019Updated 6 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 8 years ago