TheManyHatsClub-CTF / TheManyHatsClubCTF
Challenges for the TheManyHatsClub CTF
☆11Updated last year
Alternatives and similar repositories for TheManyHatsClubCTF:
Users that are interested in TheManyHatsClubCTF are comparing it to the libraries listed below
- OAuth 2.0 Dynamic Security Scanner☆31Updated 3 years ago
- ☆32Updated 4 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆77Updated 11 months ago
- ☆9Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- ☆28Updated 8 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- WStalker: an easy proxy☆26Updated 4 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 6 months ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- material for exploit development☆16Updated 5 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Updated 4 years ago
- ☆19Updated 5 years ago
- Posts about different topics☆36Updated 10 months ago
- Notes as I learn basic AWS penetration testing☆68Updated 5 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- ☆37Updated 4 years ago
- Scripts to extract files from SCM directories left on web servers☆35Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- ☆51Updated 4 months ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago