Example reports from prior years of the Collegiate Penetration Testing Competition
☆161Oct 12, 2025Updated 6 months ago
Alternatives and similar repositories for report_examples
Users that are interested in report_examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This contains the public CCDC materials for Cyber@UCR.☆37Dec 2, 2023Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Base LaTeX template for a penetration test report.☆43Mar 7, 2022Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆109Oct 14, 2021Updated 4 years ago
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆152Apr 27, 2026Updated last week
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 3 years ago
- FireProx written in Go☆20Apr 13, 2024Updated 2 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated 2 months ago
- ☆12Oct 15, 2024Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆77Nov 19, 2024Updated last year
- ☆11Sep 14, 2020Updated 5 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cross Compatible Command and Control☆48Dec 18, 2025Updated 4 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 3 months ago
- Libgore☆13Apr 14, 2023Updated 3 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆138Apr 20, 2026Updated 2 weeks ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- This repo is dedicated to a powerpoint exploit☆33Dec 11, 2020Updated 5 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆32May 29, 2024Updated last year