asynchronous-x / orbital-ctfLinks
Orbital - A Custom CTF Platform
☆73Updated 6 months ago
Alternatives and similar repositories for orbital-ctf
Users that are interested in orbital-ctf are comparing it to the libraries listed below
Sorting:
- This is practice VM for malware development☆170Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated last month
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 8 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆284Updated 5 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆167Updated 3 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆236Updated this week
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆261Updated 3 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 5 months ago
- macos stealer poc☆133Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆207Updated 3 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 7 months ago
- ☆51Updated 5 months ago
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆414Updated last month
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- ☆71Updated 11 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- An archive of 0day.today exploits☆326Updated 5 months ago
- A powershell module for hiding payloads in the pixels of images☆77Updated last year
- ☆157Updated 8 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- Detects process injection and memory manipulation used by malware. Finds RWX regions, shellcode patterns, API hooks, thread hijacking, an…☆233Updated 2 weeks ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated 3 weeks ago
- C2 writen in Rust & Go powered by Tor network.☆151Updated 2 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆119Updated last week
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆211Updated last week
- Generate backdoored RSA keys using SETUP☆222Updated 3 weeks ago