gabemarshall / microctfsLinks
Small CTF challenges running on Docker
☆159Updated 6 years ago
Alternatives and similar repositories for microctfs
Users that are interested in microctfs are comparing it to the libraries listed below
Sorting:
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- ☆122Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- ☆92Updated 6 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Red Team Resources☆60Updated 6 years ago
- DefCon24☆121Updated 8 years ago
- ☆206Updated 4 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- ☆89Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- The Outlook HTML Leak Test Project☆131Updated 7 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Some scripts and exploits☆146Updated 6 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆209Updated 7 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- BSidesCBR CTF docker compose files☆67Updated 4 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 11 months ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆394Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 9 years ago