Example reports from prior years of the Collegiate Penetration Testing Competition
☆159Oct 12, 2025Updated 5 months ago
Alternatives and similar repositories for report_examples
Users that are interested in report_examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆109Oct 14, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆139Mar 30, 2025Updated 11 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last month
- ☆12Oct 15, 2024Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Sample list of penetration test reports☆17Dec 12, 2016Updated 9 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Jan 12, 2022Updated 4 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Jun 8, 2025Updated 9 months ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆53Feb 4, 2025Updated last year
- Scoring Engine for Red/White/Blue Team Competitions☆135Mar 19, 2026Updated last week
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Jun 20, 2019Updated 6 years ago
- Libgore☆13Apr 14, 2023Updated 2 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- Discord C2 for Redteam....Need a better name☆142May 7, 2023Updated 2 years ago
- awesome resources about cloud security 🐿☆20Dec 2, 2021Updated 4 years ago