PinkDraconian / CTF-bash-toolsLinks
Toolset for automating common management actions used in CTF's
☆41Updated 3 years ago
Alternatives and similar repositories for CTF-bash-tools
Users that are interested in CTF-bash-tools are comparing it to the libraries listed below
Sorting:
- ☆82Updated 5 years ago
- ☆48Updated last year
- ☆66Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- ☆60Updated 3 years ago
- Active Directory Wordlists☆98Updated 5 years ago
- ☆38Updated 2 years ago
- A python based blind SQL injection exploitation script☆136Updated 5 years ago
- ☆29Updated 4 years ago
- Active Directory Labs/exams Review☆257Updated 4 years ago
- ☆108Updated 2 years ago
- Notes compiled for the OSCP exam.☆155Updated 3 years ago
- ☆146Updated 2 months ago
- ☆131Updated 4 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆92Updated 3 weeks ago
- Preparation for OSWE☆42Updated 5 years ago
- This repo explains in details about buffer overflow exploit development for windows executable.☆43Updated last year
- CVE-2007-2447 - Samba usermap script☆60Updated 4 years ago
- ☆29Updated 5 years ago
- ☆122Updated 4 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆65Updated 3 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 4 years ago
- PHP 8.1.0-dev Backdoor System Shell Script☆92Updated 4 years ago
- ☆38Updated 5 months ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆76Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week