Official Writeups for HackTheBox Business CTF 2025: Operation Blackout
☆62Jun 5, 2025Updated 10 months ago
Alternatives and similar repositories for business-ctf-2025
Users that are interested in business-ctf-2025 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- Precompiled binaries for windows & Linux☆34Jun 11, 2025Updated 10 months ago
- Explorando Remote Desktop do Windows Server 2003 com o exploit Esteemaudit (MS12-020) e obtendo RCE (sem Metasploit)☆19Feb 28, 2023Updated 3 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆63Nov 16, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Parses RecentFileCacheParser.bcf files☆30Feb 2, 2025Updated last year
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 6 months ago
- ☆13Jan 26, 2023Updated 3 years ago
- ☆11Aug 28, 2025Updated 7 months ago
- Assembly Language Tutorials for Windows☆12Apr 14, 2018Updated 7 years ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)☆14Jun 11, 2023Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆22Aug 20, 2024Updated last year
- ☆25Mar 22, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- ☆24Apr 23, 2024Updated last year
- ☆16Apr 6, 2021Updated 5 years ago
- Burp Suite HTTP proxy history viewer☆18Jan 22, 2017Updated 9 years ago
- This repo contains solution for ctf challenges☆38Nov 30, 2024Updated last year
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 12 years ago
- Let's try harder...☆20Jun 6, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- Notes and challenges from the HeapLAB course taught by Max Kamper.☆22Aug 28, 2021Updated 4 years ago
- ☆15Mar 30, 2025Updated last year
- Learning Assembly☆14Jan 8, 2023Updated 3 years ago
- Conformity Terraform provider☆11Updated this week
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5☆16Apr 3, 2022Updated 4 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- ☆27Apr 28, 2022Updated 3 years ago
- ☆17May 3, 2025Updated 11 months ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- ☆135Feb 3, 2026Updated 2 months ago
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆135Apr 2, 2026Updated last week
- ☆26Jun 23, 2016Updated 9 years ago