purplestormctf / CTF-Notes
From Zero To Hero
☆23Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for CTF-Notes
- purplestorm writeup collection☆16Updated last week
- Offensive Security OSWE Prep 2022☆72Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆68Updated last year
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆27Updated last week
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated 11 months ago
- Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.☆27Updated last week
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆26Updated 3 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆24Updated 8 months ago
- ☆31Updated 3 months ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆24Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆55Updated last month
- ☆25Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9464☆40Updated last month
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆22Updated 4 months ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆35Updated 8 months ago
- Official writeups for Hack The Boo CTF 2023☆40Updated last year
- Gonna share my writeups and resources here☆57Updated last year
- ☆57Updated 2 years ago
- POC for CVE-2021-41091☆65Updated last year
- Command line client for HackTheBox☆21Updated 8 months ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆15Updated last year
- ☆48Updated last week
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆85Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆59Updated last month
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆59Updated 7 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway☆28Updated last year
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆29Updated 2 years ago
- some of the commands I usually use when doing HTB machines☆37Updated 10 months ago