noraj / ctf-party
A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
☆83Updated 3 weeks ago
Alternatives and similar repositories for ctf-party:
Users that are interested in ctf-party are comparing it to the libraries listed below
- A CLI tool to identify the hash type of a given hash.☆112Updated 2 years ago
- ☆66Updated 3 years ago
- Practice Labs☆89Updated 4 years ago
- ☆48Updated 10 months ago
- ☆60Updated 3 years ago
- Simple HTTP listener for security testing☆113Updated 5 months ago
- Powershell script to extract information from boot PXE☆139Updated 6 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 9 months ago
- List of red team resources☆93Updated 7 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆198Updated 9 months ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- OSCP notes, commands, tools, and more.☆98Updated 2 years ago
- Toolset for automating common management actions used in CTF's☆39Updated 3 years ago
- Community documentation for known Hack The Box v4 API endpoints☆24Updated 2 years ago
- A collection of my adventures through hackthebox.eu☆33Updated 4 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆103Updated 3 years ago
- Simple TTY cheat sheet for shell stabilization☆35Updated 4 years ago
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆167Updated 2 years ago
- ☆52Updated last year
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆48Updated 2 months ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- ☆62Updated 4 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- brute-forcing su for fun and possibly profit☆91Updated 5 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago