Yet Another CTF Playbook
☆25Jul 29, 2025Updated 7 months ago
Alternatives and similar repositories for yaCTFpl
Users that are interested in yaCTFpl are comparing it to the libraries listed below
Sorting:
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- Оценка ИЦБ ДОМ.РФ и других с симуляционными моделями для короткой ставки и досрочных погашений☆10Oct 14, 2019Updated 6 years ago
- CyberArk Credentials Provider (CCP) Plugin for HashiCorp Vault☆17Jan 12, 2024Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- Miscellaneous utilities that make it easier to make, manage, and run demos☆10Updated this week
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- python coding guidelines☆13May 31, 2022Updated 3 years ago
- Grants Conjur machine identity to hosts☆12Feb 27, 2019Updated 7 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Firebug-like dir() for Node.js.☆15Apr 9, 2011Updated 14 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- A curated list of awesome frameworks, libraries and software for the Java programming language.☆11Aug 21, 2017Updated 8 years ago
- Connect to CyberArk Target servers transparently☆17Jul 15, 2020Updated 5 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Showcasing the potential of SPIFFE with real-life services☆10Jan 27, 2026Updated last month
- ☆12Jun 23, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 9 months ago
- OpenAPI specification for CyberArk Secrets Manager☆10Oct 21, 2025Updated 4 months ago
- Introduction to Machine Learning by HSE and Yandex School of Data Analysis☆13Dec 16, 2017Updated 8 years ago
- Some VPN subscriptions.☆30Feb 22, 2026Updated last week
- ☆15Nov 23, 2015Updated 10 years ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 3 years ago
- Ansible Galaxy Role to install and uninstall Cyberark AIM provider☆15Jan 17, 2023Updated 3 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- The purpose of Raster Fairy is to transform any kind of 2D point cloud into a regular raster whilst trying to preserve the neighborhood r…☆13Apr 18, 2017Updated 8 years ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆18Jul 3, 2024Updated last year
- A Golang package for simplifying storing configuration in the OS-provided secret manager.☆16Jan 24, 2024Updated 2 years ago
- List of http static server one-liners☆15Jul 3, 2017Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated last week
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- ☆20May 28, 2023Updated 2 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- A UDF library with additional string functions for MySQL☆18Apr 30, 2014Updated 11 years ago
- Framework for Cyberark API☆22Jun 4, 2025Updated 8 months ago