ivanitlearning / CTF-ReposLinks
Material from CTF machines I have attempted
☆38Updated 4 years ago
Alternatives and similar repositories for CTF-Repos
Users that are interested in CTF-Repos are comparing it to the libraries listed below
Sorting:
- Upload files done during my research.☆167Updated 2 weeks ago
- Automate the build of a vulnerable AD environment.☆39Updated 3 years ago
- Notes for CRTP☆42Updated 5 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Updated 2 years ago
- https://alvinsmith.gitbook.io/progressive-oscp/☆39Updated 9 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- Spoofcheck☆46Updated 7 months ago
- Repository of CVE found by OCD people☆83Updated 6 months ago
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- ☆40Updated 3 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆88Updated 4 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆102Updated 2 years ago
- ☆33Updated 4 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆53Updated 3 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 4 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Updated 3 years ago
- ☆27Updated 3 years ago
- Collection of username lists for enumerating kerberos domain users☆104Updated 8 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- ☆48Updated 2 months ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 7 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- ☆27Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆124Updated 4 months ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆84Updated 4 months ago