asynchronous-x / orbital-ctfLinks
Orbital - A Custom CTF Platform
☆29Updated this week
Alternatives and similar repositories for orbital-ctf
Users that are interested in orbital-ctf are comparing it to the libraries listed below
Sorting:
- The most complete code auditing platform with thousands of real-world challenges☆83Updated 3 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆56Updated 8 months ago
- ☆37Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆144Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆40Updated last month
- ☆99Updated last month
- ☆136Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆50Updated 2 months ago
- https://lolad-project.github.io/☆76Updated 5 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆102Updated 2 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆213Updated this week
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆79Updated 3 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 8 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆93Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆81Updated last week
- Lena's repo of Malware Monsters aka Malmons.☆37Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆89Updated 2 months ago
- ☆72Updated last year
- Repo for all my exploits/PoCs☆51Updated last month
- ☆24Updated 3 months ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆16Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆138Updated 3 months ago
- ☆105Updated 10 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated last month