ivanitlearning / CTF-ReposLinks
Material from CTF machines I have attempted
☆35Updated 4 years ago
Alternatives and similar repositories for CTF-Repos
Users that are interested in CTF-Repos are comparing it to the libraries listed below
Sorting:
- Upload files done during my research.☆164Updated 3 months ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆84Updated 4 years ago
- Notes for CRTP☆41Updated 4 years ago
- ☆26Updated 3 years ago
- ☆42Updated last year
- Spoofcheck☆39Updated 2 months ago
- ☆24Updated 3 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆83Updated 2 months ago
- Repository of CVE found by OCD people☆77Updated last month
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- ☆38Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Updated 4 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆64Updated 3 months ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆91Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆95Updated 7 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 6 months ago
- Exploit to dump ipmi hashes☆35Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆51Updated 3 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆70Updated 2 years ago
- ☆29Updated 4 years ago
- POC for CVE-2024-23897 Jenkins File-Read☆29Updated 5 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago