ignis-sec / CtfCryptoToolLinks
A tool for automated analysis of ctf type crypto challenges
☆29Updated 5 years ago
Alternatives and similar repositories for CtfCryptoTool
Users that are interested in CtfCryptoTool are comparing it to the libraries listed below
Sorting:
- Our team's CTF writeups☆12Updated 5 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆77Updated 5 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆180Updated 2 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- A Pwning Toolkit☆28Updated 9 months ago
- Linux privilege escalation via LXD☆139Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Updated 5 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆29Updated 5 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges☆48Updated 4 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆56Updated 6 months ago
- ☆45Updated 4 years ago
- CVE-2020-????☆106Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- ☆147Updated 6 years ago
- A tool for creating proxy dll for hijacking☆42Updated last year
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Statically built netcat binaries for Linux (other OSes can be added later)☆36Updated 7 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago