ivanitlearning / CTF-ReposLinks
Material from CTF machines I have attempted
☆36Updated 4 years ago
Alternatives and similar repositories for CTF-Repos
Users that are interested in CTF-Repos are comparing it to the libraries listed below
Sorting:
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Repository of CVE found by OCD people☆79Updated 3 months ago
- Collection of username lists for enumerating kerberos domain users☆100Updated 7 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 3 years ago
- ☆31Updated 4 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆94Updated 2 years ago
- Spoofcheck☆42Updated 4 months ago
- Upload files done during my research.☆165Updated 6 months ago
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆18Updated 2 years ago
- ☆48Updated 4 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago
- Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Updated 4 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- https://alvinsmith.gitbook.io/progressive-oscp/☆40Updated 6 months ago
- ☆42Updated last year
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated this week
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- ☆38Updated 3 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆53Updated 3 years ago
- Reverse Shell-able Windows exploits short POCs.☆32Updated 5 years ago
- Exploit to dump ipmi hashes☆36Updated 2 years ago
- ☆29Updated 4 years ago
- ☆44Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆114Updated 2 months ago
- ☆34Updated 3 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆93Updated last week
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago