Writeup for the challenges in H@cktivityCon CTF 2020
☆17Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for HacktivityCon_CTF_2020
Users that are interested in HacktivityCon_CTF_2020 are comparing it to the libraries listed below
Sorting:
- C-based Reverse Shell that uses CMD or PowerShell☆16Aug 15, 2020Updated 5 years ago
- Hackthebox automation scripts and writeups.☆22Jan 27, 2020Updated 6 years ago
- Best way to learn x86 is by hacking it☆28Dec 17, 2018Updated 7 years ago
- Collection of CS2030 toy programs and PYPs - last updated 31 December 2025☆13Dec 30, 2025Updated 2 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- ☆12Nov 23, 2025Updated 3 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆43Nov 21, 2024Updated last year
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Python implementation of the XDL protocol☆14Jul 18, 2022Updated 3 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- All DISM lecture/note materials☆19Feb 19, 2021Updated 5 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- ☆22Feb 26, 2026Updated last week
- Certipy in Docker☆13Mar 28, 2024Updated last year
- ☆12Apr 20, 2017Updated 8 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Example of creating desktop App to embed Firefox browser into Winform applications☆12Sep 29, 2019Updated 6 years ago
- lightweight C++ library for parsing and manipulating INI (Initialization) files. INI files are simple text files that store configuration…☆13Aug 22, 2024Updated last year
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆19Jul 9, 2025Updated 7 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago