purplestormctf / Writeups
purplestorm writeup collection
☆16Updated this week
Alternatives and similar repositories for Writeups:
Users that are interested in Writeups are comparing it to the libraries listed below
- ☆56Updated 3 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆42Updated 3 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆81Updated 2 weeks ago
- #cheat sheet for OSWP☆8Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆73Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆104Updated last year
- ☆74Updated 2 weeks ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆30Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆66Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆46Updated last month
- A small red team course☆34Updated last year
- Bad scripts I made doing CTF's☆21Updated last year
- ☆16Updated 4 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆58Updated 4 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- Most Responder's configuration power in your hand.☆42Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆58Updated last week
- ☆58Updated 9 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- ☆29Updated 4 months ago
- Breaking Active Directory Security with 🍞☆31Updated 2 months ago
- ☆34Updated 3 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 11 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆43Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Brief writeup of post exploitation methodologies.☆17Updated last year