lasq88 / CTF
Materials from different CTFs for later reuse
☆25Updated 2 years ago
Alternatives and similar repositories for CTF:
Users that are interested in CTF are comparing it to the libraries listed below
- ☆31Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 2 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- Creates and sends fake meeting invite☆59Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Challenge files☆11Updated 3 years ago
- ☆20Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆28Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆16Updated 6 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆39Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- ☆41Updated 2 years ago
- Vulnerable Windows Application☆15Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- Posts about different topics☆36Updated last year
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- My collection of self-written exploits☆21Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- ☆48Updated 4 years ago
- ☆45Updated 4 years ago
- Pentest stuff☆49Updated last year
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Upload files done during my research.☆155Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Practice Labs☆86Updated 4 years ago