purplestormctf / WriteupsLinks
purplestorm writeup collection
☆20Updated this week
Alternatives and similar repositories for Writeups
Users that are interested in Writeups are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 weeks ago
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- ☆59Updated 8 months ago
- ☆40Updated this week
- Bad scripts I made doing CTF's☆21Updated last year
- ☆18Updated 8 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated 11 months ago
- List of some AD tools I frequently use☆46Updated 4 months ago
- ☆31Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- ☆56Updated 6 months ago
- ☆72Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- Custom config.☆18Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆61Updated 6 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 8 months ago
- A small red team course☆39Updated 2 years ago
- ☆19Updated last year
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆16Updated 2 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 5 months ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆13Updated 7 months ago
- Repository for doing pen300 exercises☆18Updated 2 years ago
- ☆41Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆20Updated 3 years ago
- ☆14Updated last year