noraj / ctf-partyLinks
A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
☆87Updated 4 months ago
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below
Sorting:
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆49Updated last year
- ☆67Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆215Updated last year
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- brute-forcing su for fun and possibly profit☆98Updated 6 years ago
- ☆62Updated 3 years ago
- Practice Labs☆100Updated 4 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Updated 2 years ago
- For my Try Hack Me room: Intro To Pwntools☆28Updated 4 years ago
- ☆33Updated 4 years ago
- ☆26Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆59Updated 2 years ago
- Simple HTTP listener for security testing☆117Updated 11 months ago
- Community documentation for known Hack The Box v4 API endpoints☆26Updated 3 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- ☆48Updated 3 years ago
- ☆38Updated 4 years ago
- ☆108Updated last year
- Don't expect much :) Just expect to learn new things!☆63Updated 4 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Notes compiled for the OSCP exam.☆158Updated 3 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- ☆49Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 2 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- Abertay CMP202 Project☆34Updated 4 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago