Example reports from prior years of the Collegiate Penetration Testing Competition
☆159Oct 12, 2025Updated 4 months ago
Alternatives and similar repositories for report_examples
Users that are interested in report_examples are comparing it to the libraries listed below
Sorting:
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- ☆108Oct 14, 2021Updated 4 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆139Mar 30, 2025Updated 11 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- ☆14Jan 25, 2022Updated 4 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- ☆11Oct 3, 2021Updated 4 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- A LLM CTF Challenge☆32Mar 11, 2025Updated 11 months ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- ☆12Oct 15, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆29May 29, 2024Updated last year
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Mar 6, 2021Updated 4 years ago
- singe's grep - a fast grep using single-file parallelism☆47Oct 29, 2022Updated 3 years ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Tool to discover external and internal network attack surface☆203May 21, 2024Updated last year
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago