hackthebox / business-ctf-2024View external linksLinks
Official writeups for Business CTF 2024: The Vault Of Hope
☆159Dec 4, 2024Updated last year
Alternatives and similar repositories for business-ctf-2024
Users that are interested in business-ctf-2024 are comparing it to the libraries listed below
Sorting:
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆217Dec 4, 2024Updated last year
- Official writeups for Hack The Boo CTF 2023☆45Dec 4, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- ☆16Nov 17, 2023Updated 2 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- purplestorm writeup collection☆29Feb 7, 2026Updated last week
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- Containers Wrapper is a Go library that provides a convenient and unified interface for interacting with container engines such as Docker…☆13Sep 10, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- ☆109Nov 7, 2024Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆165Jul 16, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆13Mar 12, 2022Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆18Jan 31, 2025Updated last year
- ☆11Feb 6, 2023Updated 3 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 5 months ago
- ☆13Dec 24, 2023Updated 2 years ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆91May 24, 2025Updated 8 months ago
- ☆14Aug 28, 2023Updated 2 years ago
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 3 years ago
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆669Oct 23, 2025Updated 3 months ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 weeks ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Lab used for workshop and CTF☆491Feb 3, 2026Updated last week
- Scan your account for the use of untrusted AMIs☆31Dec 5, 2025Updated 2 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Kumpulan writeup dari lomba lomba CTF dan juga soalnya (kalau ada)☆13May 2, 2023Updated 2 years ago
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago