asynchronous-x / orbital-ctfLinks
Orbital - A Custom CTF Platform
☆72Updated 4 months ago
Alternatives and similar repositories for orbital-ctf
Users that are interested in orbital-ctf are comparing it to the libraries listed below
Sorting:
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
 - An archive of 0day.today exploits☆302Updated 3 months ago
 - The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆291Updated last week
 - Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆180Updated last month
 - The most complete code auditing platform with thousands of real-world challenges☆130Updated 4 months ago
 - SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆161Updated 5 months ago
 - macos stealer poc☆126Updated 3 months ago
 - AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆108Updated 3 months ago
 - Vibe Malware Triage - MCP server for static PE analysis.☆71Updated 5 months ago
 - Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 3 months ago
 - SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆250Updated last month
 - Lena's repo of Malware Monsters aka Malmons.☆44Updated last month
 - APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 7 months ago
 - Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 6 months ago
 - Execute shellcode via ASPNET compiler☆58Updated last month
 - A delicious, but malicious SSL-VPN server 🌮☆252Updated last month
 - Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆37Updated last month
 - Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆88Updated last month
 - A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 5 months ago
 - Collection of codes focused on Linux rootkits☆182Updated last week
 - ☆175Updated this week
 - An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 5 months ago
 - A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆149Updated 3 months ago
 - Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆338Updated 2 months ago
 - Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
 - Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 6 months ago
 - Tool designed to exfiltrate OneDrive Business OCR Data☆123Updated 9 months ago
 - This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆104Updated 2 months ago
 - 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 10 months ago
 - Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆113Updated 3 months ago