purplestormctf / WriteupsLinks
purplestorm writeup collection
☆26Updated last week
Alternatives and similar repositories for Writeups
Users that are interested in Writeups are comparing it to the libraries listed below
Sorting:
- ☆85Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆43Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆39Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 3 months ago
- ☆44Updated 2 weeks ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆22Updated last year
- Offensive Security OSWE Prep 2022☆74Updated 3 years ago
- My Favorite Offensive Security Scripts☆73Updated 6 months ago
- ☆95Updated 8 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 5 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- ☆42Updated 3 weeks ago
- ☆91Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆137Updated 2 years ago
- ☆38Updated 3 years ago
- Precompiled binaries for windows & Linux☆27Updated 4 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 9 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- ☆38Updated 4 years ago
- List of some AD tools I frequently use☆48Updated 4 months ago
- ☆18Updated last year
- ☆61Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆128Updated 2 years ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆46Updated 3 weeks ago
- Automate converting webshells into reverse shells.☆71Updated 2 weeks ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course