SoftEng-HEIGVD / Teaching-HEIGVD-AMT-2019-Main
Main repo for AMT 2019, contains slides
☆20Updated 5 years ago
Alternatives and similar repositories for Teaching-HEIGVD-AMT-2019-Main
Users that are interested in Teaching-HEIGVD-AMT-2019-Main are comparing it to the libraries listed below
Sorting:
- A set of security related tools☆665Updated 4 years ago
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,721Updated 2 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,345Updated 4 months ago
- ☆2,437Updated 9 months ago
- Writeups for HacktheBox 'boot2root' machines☆1,957Updated last year
- Pentest Report Generator☆2,516Updated 2 weeks ago
- Katana - Automatic CTF Challenge Solver in Python3☆1,303Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,460Updated last month
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,119Updated 3 weeks ago
- Collection of steganography tools - helps with CTF challenges☆2,517Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,272Updated 3 weeks ago
- Some setup scripts for security research tools.☆8,883Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,806Updated 2 months ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆3,763Updated 3 weeks ago
- Ctf solutions from p4 team☆1,809Updated 8 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,419Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,355Updated last year
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,731Updated 4 years ago
- A swiss army knife for pentesting networks☆8,720Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,605Updated 6 months ago
- A script that you can run in the background!☆2,843Updated 9 months ago
- 🎯 Command Injection Payload List☆3,286Updated 10 months ago
- Web path scanner☆12,880Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,292Updated 6 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,864Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,228Updated 6 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10,347Updated 9 months ago
- Writeups of previous editions☆71Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,194Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity