olnor18 / DDC-Pentest-CourseLinks
☆8Updated last year
Alternatives and similar repositories for DDC-Pentest-Course
Users that are interested in DDC-Pentest-Course are comparing it to the libraries listed below
Sorting:
- Workshop on binary exploitation for the Danish Cybersecurity Championships☆21Updated last year
- ☆14Updated 2 years ago
- Fancy reverse and bind shell handler☆2,768Updated 11 months ago
- pwninit - automate starting binary exploit challenges☆957Updated 11 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,345Updated 5 months ago
- Vulnerable server used for learning software exploitation☆1,054Updated 4 years ago
- Instructions on how to create your very own Pwnbox, originally created by HTB☆406Updated 2 years ago
- Place for content used during GenCyber camps.☆15Updated last month
- Katana - Automatic CTF Challenge Solver in Python3☆1,307Updated last year
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆568Updated 4 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,359Updated 3 months ago
- A tutorial on using JohnTheRipper and Hashcat to crack lost keepass passwords☆69Updated 4 years ago
- Starkiller is a Frontend for PowerShell Empire.☆1,514Updated last week
- ☆1,395Updated 4 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,142Updated last year
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,220Updated 2 years ago
- Basic Linux Command Line and Bash Scripting☆12Updated 3 years ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,154Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,565Updated last week
- Writeups of previous editions☆72Updated last year
- A small reverse shell for Linux & Windows☆609Updated last year
- ☆29Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,906Updated last month
- A set of security related tools☆665Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,485Updated 9 months ago
- Privilege Escalation Enumeration Script for Windows☆3,364Updated 3 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,453Updated 2 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,983Updated 10 months ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆989Updated 2 years ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆624Updated 2 years ago