ivanitlearning / CTF-ReposLinks
Material from CTF machines I have attempted
☆35Updated 4 years ago
Alternatives and similar repositories for CTF-Repos
Users that are interested in CTF-Repos are comparing it to the libraries listed below
Sorting:
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆83Updated 2 weeks ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Upload files done during my research.☆164Updated 4 months ago
- ☆29Updated 4 years ago
- ☆42Updated last year
- Repository of CVE found by OCD people☆79Updated 2 months ago
- Notes for CRTP☆41Updated 4 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago
- https://alvinsmith.gitbook.io/progressive-oscp/☆40Updated 5 months ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆70Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- Exploit to dump ipmi hashes☆35Updated 2 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- Collection of username lists for enumerating kerberos domain users☆97Updated 7 years ago
- ☆22Updated last year
- ☆38Updated 3 years ago
- ☆44Updated 2 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆86Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆31Updated 4 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Spoofcheck☆39Updated 3 months ago
- ☆81Updated 5 years ago
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆39Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- ☆35Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Updated 5 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year