gabemarshall / microctfsLinks
Small CTF challenges running on Docker
☆159Updated 6 years ago
Alternatives and similar repositories for microctfs
Users that are interested in microctfs are comparing it to the libraries listed below
Sorting:
- ☆122Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- BSidesCBR CTF docker compose files☆67Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Some scripts and exploits☆146Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆71Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- ☆92Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Database of websites for penetration testing☆176Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- ☆89Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago