asynchronous-x / orbital-ctfLinks
Orbital - A Custom CTF Platform
☆72Updated 3 months ago
Alternatives and similar repositories for orbital-ctf
Users that are interested in orbital-ctf are comparing it to the libraries listed below
Sorting:
- An archive of 0day.today exploits☆200Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- The most complete code auditing platform with thousands of real-world challenges☆130Updated 3 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆160Updated 4 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆237Updated last week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆86Updated last month
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆76Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆152Updated 3 weeks ago
- macos stealer poc☆124Updated 2 months ago
- ☆171Updated 2 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆70Updated 4 months ago
- Execute shellcode via ASPNET compiler☆49Updated last week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆192Updated last week
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 2 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Updated 3 months ago
- ☆153Updated 5 months ago
- A delicious, but malicious SSL-VPN server 🌮☆250Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 6 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆107Updated 2 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 9 months ago
- Make your programs stealthier🐝☆188Updated 3 months ago
- Collection of codes focused on Linux rootkits☆167Updated 3 weeks ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated 5 months ago
- ☆164Updated 5 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆64Updated 2 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆364Updated 3 weeks ago
- Lena's repo of Malware Monsters aka Malmons.☆44Updated 2 weeks ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆312Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆189Updated last week