purplestormctf / Writeups
purplestorm writeup collection
☆16Updated this week
Alternatives and similar repositories for Writeups:
Users that are interested in Writeups are comparing it to the libraries listed below
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 4 months ago
- ☆37Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆69Updated this week
- Make an Linux Kernel rootkit visible again.☆47Updated this week
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- ☆58Updated 4 months ago
- Bad scripts I made doing CTF's☆21Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last month
- Repo for all my exploits/PoCs☆47Updated last week
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated 11 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- A small red team course☆35Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- ☆54Updated 3 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆13Updated 4 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated last month
- Creating a Malicious Macro using MS Word☆19Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- ☆12Updated 4 years ago
- ☆37Updated 2 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 2 months ago
- Breaking Active Directory Security with 🍞☆31Updated 3 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 2 months ago
- aiohttp LFI (CVE-2024-23334)☆25Updated 11 months ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆37Updated last month
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Command line client for HackTheBox☆22Updated last year