Official writeups for Business CTF 2024: The Vault Of Hope
☆159Dec 4, 2024Updated last year
Alternatives and similar repositories for business-ctf-2024
Users that are interested in business-ctf-2024 are comparing it to the libraries listed below
Sorting:
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆218Dec 4, 2024Updated last year
- Official writeups for Hack The Boo CTF 2023☆45Dec 4, 2024Updated last year
- Official writeups for University CTF 2023: Brains & Bytes☆105Dec 4, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- ☆16Nov 17, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 4 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- Containers Wrapper is a Go library that provides a convenient and unified interface for interacting with container engines such as Docker…☆13Sep 10, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- ☆108Nov 7, 2024Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆166Jul 16, 2023Updated 2 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 4 months ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- ☆13Dec 24, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆13Mar 12, 2022Updated 3 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- ☆14Aug 28, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆92May 24, 2025Updated 9 months ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated last year
- ☆19Jan 31, 2025Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago