Ph4l4nx / CTF-s-ToolsLinks
Repository to index useful tools for CTF's
☆26Updated 3 weeks ago
Alternatives and similar repositories for CTF-s-Tools
Users that are interested in CTF-s-Tools are comparing it to the libraries listed below
Sorting:
- A curated list of resources for the OSED journey.☆63Updated 3 years ago
- ☆60Updated 3 years ago
- Practice Labs☆91Updated 4 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆98Updated 3 years ago
- Gonna share my writeups and resources here☆66Updated 4 months ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆55Updated last year
- ☆184Updated last year
- Official writeups for Hack The Boo CTF 2023☆44Updated 6 months ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆206Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆164Updated 4 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆70Updated last year
- A collection of my adventures through hackthebox.eu☆33Updated 4 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆101Updated 2 years ago
- ☆40Updated last year
- Local Privilege Escalation in polkit's pkexec☆73Updated 3 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆153Updated 2 years ago
- esoteric☆54Updated 4 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆203Updated 10 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Updated 9 months ago
- Active Directory Labs/exams Review☆254Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆29Updated 6 years ago
- OSCP Methodology☆43Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Notes compiled for the OSCP exam.☆152Updated 3 years ago
- Simple HTTP listener for security testing☆114Updated 6 months ago