gabemarshall / microctfsView external linksLinks
Small CTF challenges running on Docker
☆158Jul 26, 2018Updated 7 years ago
Alternatives and similar repositories for microctfs
Users that are interested in microctfs are comparing it to the libraries listed below
Sorting:
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Bash post exploitation toolkit☆744Jul 19, 2023Updated 2 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 2 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- ☆99May 3, 2018Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Exfiltrate data with ICMP☆102Jan 31, 2018Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- Building an Active Directory domain and hacking it☆664Dec 23, 2019Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- ☆230May 10, 2018Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- Framework for exploiting local vulnerabilities☆84Nov 18, 2023Updated 2 years ago
- Bodhi - Client-side Vulnerability Playground☆123Jun 1, 2021Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Jan 12, 2023Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Listing subdomains about a main domain☆58May 9, 2018Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago