fraynal / challenges
Small cyber challenges for fun and no profit
☆10Updated this week
Alternatives and similar repositories for challenges:
Users that are interested in challenges are comparing it to the libraries listed below
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆136Updated this week
- Active Directory Mindmap Recipes: A Compromise à la Carte☆106Updated 3 weeks ago
- Speed up your pentest enumeration☆83Updated last month
- répertoire de publication web public☆44Updated 10 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆79Updated this week
- AzureKitty is an Office 365 and Azure configuration audit tool☆14Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 5 months ago
- Outils ESD academy☆56Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 2 months ago
- Docker images of the Exegol project☆105Updated this week
- BreizhCTF 2023 - Challenges☆27Updated 2 years ago
- ☆159Updated 6 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆212Updated 4 months ago
- ☆173Updated 3 months ago
- ☆93Updated 3 weeks ago
- GLPI vulnerabilities checking tool☆106Updated last week
- ☆17Updated 2 years ago
- Pentest Report Generator☆404Updated last week
- ☆17Updated last year
- SwitchToOpen - The open source shift☆53Updated 2 months ago
- Find CVEs associated to Linux and public exploits on github☆117Updated 2 weeks ago
- Epreuves de sélection de la TeamFR pour l'ECSC 2019.☆163Updated last year
- CRY.ME (CRYptographic MEssaging application)☆169Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆99Updated 8 months ago
- Identify the accounts most vulnerable to dictionary attacks☆119Updated 3 weeks ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆142Updated last year
- Active Directory Enumeration and Exploitation☆11Updated last month
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆28Updated last month
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆99Updated 3 weeks ago
- ☆12Updated 2 months ago