noraj / ctfd-theme-sigsegv2Links
SigSegv2 CTFd theme
☆10Updated 4 years ago
Alternatives and similar repositories for ctfd-theme-sigsegv2
Users that are interested in ctfd-theme-sigsegv2 are comparing it to the libraries listed below
Sorting:
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Creating attacks based on polyglot files. This tool (experimental) is useful in offensive security (stego malware, privilege escalation, …☆9Updated 5 years ago
- ☆12Updated 4 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- CVE, reports, research☆17Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 4 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Some CTF writeups written by meeeeeee☆7Updated last year
- ☆10Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Accompanying material needed for the workshop☆11Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ☆9Updated last year
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- ☆29Updated 2 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Updated 6 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago