Official Writeups for HackTheBox Business CTF 2025: Operation Blackout
☆62Jun 5, 2025Updated 9 months ago
Alternatives and similar repositories for business-ctf-2025
Users that are interested in business-ctf-2025 are comparing it to the libraries listed below
Sorting:
- Precompiled binaries for windows & Linux☆33Jun 11, 2025Updated 9 months ago
- Explorando Remote Desktop do Windows Server 2003 com o exploit Esteemaudit (MS12-020) e obtendo RCE (sem Metasploit)☆19Feb 28, 2023Updated 3 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Nov 16, 2022Updated 3 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)☆14Jun 11, 2023Updated 2 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- Optimized WordLists for Pentesting☆16Feb 6, 2020Updated 6 years ago
- Let's try harder...☆20Jun 6, 2021Updated 4 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated 10 months ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- ☆15Mar 30, 2025Updated 11 months ago
- Learning Assembly☆14Jan 8, 2023Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆86Jan 3, 2026Updated 2 months ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- ☆134Feb 3, 2026Updated last month
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Havoc SSRF to RCE☆16Jan 20, 2025Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Yara Based Detection Engine for web browsers☆50Sep 5, 2021Updated 4 years ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆116Mar 20, 2024Updated 2 years ago
- Test suite to validate and demonstrate use cases.☆18Updated this week
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Mobster is a tool that can help you get deeper understanding into the performance of mobile web applications on real mobile devices☆38Mar 27, 2013Updated 12 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10, and Windows 11☆129Jan 12, 2025Updated last year
- UI used to manage Permanent WMI Event Consumers☆14Mar 21, 2015Updated 11 years ago
- Linpmem is a linux memory acquisition tool☆99Jun 22, 2025Updated 8 months ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago