carlospolop / easy_cryptoCTFLinks
Try to bruteforce several cypher algorithms that can be used in CTFs
☆13Updated 2 years ago
Alternatives and similar repositories for easy_cryptoCTF
Users that are interested in easy_cryptoCTF are comparing it to the libraries listed below
Sorting:
- Brutteforce for stego CTFs☆16Updated 2 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- ☆33Updated 4 months ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆13Updated 2 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Malicious traffic detection system☆11Updated 2 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆18Updated 3 years ago