asynchronous-x / orbital-ctfLinks
Orbital - A Custom CTF Platform
☆73Updated 5 months ago
Alternatives and similar repositories for orbital-ctf
Users that are interested in orbital-ctf are comparing it to the libraries listed below
Sorting:
- The most complete code auditing platform with thousands of real-world challenges☆133Updated 5 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆165Updated last week
- An archive of 0day.today exploits☆314Updated 4 months ago
- This is practice VM for malware development☆169Updated 3 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 3 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 7 months ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 2 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆259Updated 2 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆202Updated 2 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆82Updated 6 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆332Updated this week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Updated 4 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆73Updated last week
- macos stealer poc☆133Updated 4 months ago
- ☆201Updated last week
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 7 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 4 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆193Updated 4 months ago
- Collection of codes focused on Linux rootkits☆187Updated last month
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 5 months ago
- ☆52Updated 4 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆118Updated this week
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- A delicious, but malicious SSL-VPN server 🌮☆253Updated 2 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 8 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- ☆154Updated 7 months ago