lasq88 / CTF
Materials from different CTFs for later reuse
☆26Updated 2 years ago
Alternatives and similar repositories for CTF:
Users that are interested in CTF are comparing it to the libraries listed below
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- ☆31Updated 4 years ago
- You don't need wires to be connected☆40Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- Random Exploits☆50Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Gonna share my writeups and resources here☆65Updated 3 months ago
- Information Security Information From Web☆27Updated 7 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- ☆45Updated 4 years ago
- ☆48Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated 9 months ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 4 years ago
- Vulnerable Windows Application☆15Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- ☆31Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Creates and sends fake meeting invite☆59Updated 4 years ago