cobbr / JudgeLinks
Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.
☆21Updated 8 years ago
Alternatives and similar repositories for Judge
Users that are interested in Judge are comparing it to the libraries listed below
Sorting:
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- ☆23Updated 12 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- ☆33Updated 3 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Collection of information security policies.☆29Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Scans SMB for Vuln Assessment☆16Updated 8 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- 🔵 ethereum grid trading bot☆35Updated last month
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 12 years ago
- ☆30Updated 7 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 10 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Docker container for datasploit framework☆26Updated 8 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- ☆26Updated 5 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- OCL Hashcat username to decrypted password recombiner☆15Updated 10 years ago
- Useful Windows and AD tools☆15Updated 3 years ago