moloch-- / RootTheBox
A Game of Hackers (CTF Scoreboard & Game Manager)
☆992Updated 2 months ago
Alternatives and similar repositories for RootTheBox:
Users that are interested in RootTheBox are comparing it to the libraries listed below
- Post Exploitation Collection☆1,563Updated 4 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Updated last year
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆420Updated 2 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,253Updated last year
- offsec batteries included☆1,555Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,523Updated 6 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,155Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,819Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,103Updated 3 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,057Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆1,890Updated last month
- Windows / Linux Local Privilege Escalation Workshop☆1,008Updated 6 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆900Updated 4 years ago
- Vulnerability Labs for security analysis☆1,169Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,241Updated last year
- SimplE RePort wrIting and COllaboration tool☆1,096Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,269Updated 3 months ago
- A Python Package for Data Exfiltration☆782Updated 11 months ago
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆881Updated this week
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,100Updated 3 months ago
- Miscellaneous exploit code☆1,551Updated last year
- Mellivora is a CTF engine written in PHP☆445Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,053Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Updated 4 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Create randomly insecure VMs☆2,673Updated 2 weeks ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,282Updated 7 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- Pop shells like a master.☆1,458Updated 6 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,786Updated 2 years ago