noraj / ctf-partyLinks
A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
☆83Updated last month
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below
Sorting:
- A CLI tool to identify the hash type of a given hash.☆112Updated 2 years ago
- ☆66Updated 3 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Updated 2 years ago
- ☆60Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆207Updated 11 months ago
- Simple HTTP listener for security testing☆116Updated 7 months ago
- A collection of my adventures through hackthebox.eu☆34Updated 4 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- ☆36Updated 3 years ago
- Upload files done during my research.☆163Updated 3 months ago
- My Password Cracking Methodology☆82Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated 11 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- Get GTFOBins info about a given exploit from the command line☆40Updated 11 months ago
- ☆48Updated last year
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆92Updated 3 weeks ago
- OSCP notes, commands, tools, and more.☆106Updated 2 years ago
- Practice Labs☆95Updated 4 years ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆165Updated 4 years ago
- ☆29Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆104Updated 3 years ago
- Notes compiled for the OSCP exam.☆155Updated 3 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆57Updated 2 years ago
- brute-forcing su for fun and possibly profit☆93Updated 6 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- ☆146Updated 2 months ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- For my Try Hack Me room: Intro To Pwntools☆27Updated 4 years ago