asynchronous-x / orbital-ctfLinks
Orbital - A Custom CTF Platform
☆73Updated 7 months ago
Alternatives and similar repositories for orbital-ctf
Users that are interested in orbital-ctf are comparing it to the libraries listed below
Sorting:
- This is practice VM for malware development☆179Updated 2 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆289Updated 6 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆172Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- An archive of 0day.today exploits☆341Updated 6 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- ☆51Updated 6 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 7 months ago
- A YARA rule generator☆61Updated this week
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated last week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- Generate backdoored RSA keys using SETUP☆231Updated 2 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆284Updated 2 weeks ago
- A powershell module for hiding payloads in the pixels of images☆77Updated last year
- ☆341Updated this week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 5 months ago
- ☆72Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 2 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆183Updated 3 weeks ago
- A delicious, but malicious SSL-VPN server 🌮☆261Updated 4 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆416Updated 9 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 9 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated 2 months ago