purplestormctf / purplestorm-TTPsView external linksLinks
A collection of commands, tools, techniques and procedures of the purplestorm ctf team.
☆14Mar 20, 2025Updated 10 months ago
Alternatives and similar repositories for purplestorm-TTPs
Users that are interested in purplestorm-TTPs are comparing it to the libraries listed below
Sorting:
- purplestorm writeup collection☆29Updated this week
- From Zero To Hero☆34Jul 17, 2025Updated 7 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated 11 months ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆23Updated this week
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆14Mar 19, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆19Feb 21, 2025Updated 11 months ago
- Python 3 script to dump/scrape/extract company employees from XING API☆39Updated this week
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 6 months ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated last month
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- ☆43Nov 21, 2024Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 7 months ago
- The MSAK is a tool written in Python to help discovering and testing exposed standard and custom services of ModBus Servers/Slaves over S…☆20Mar 6, 2024Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Bloodhound agent for Mythic☆24Apr 19, 2025Updated 9 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- ☆22Jun 9, 2025Updated 8 months ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Nov 20, 2024Updated last year
- A virus checker for nim binaries☆22Jan 10, 2026Updated last month
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆28Aug 18, 2025Updated 5 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year