Capture The Flag Marker System
☆18Oct 21, 2018Updated 7 years ago
Alternatives and similar repositories for ctf_marker
Users that are interested in ctf_marker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆12Apr 21, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Webinterface to execute and see the output of shellbased webscanning software, but honestly would work with every shell program.☆12Apr 9, 2019Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 8 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆26Aug 21, 2023Updated 2 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆24Sep 26, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- QUIC tunnel☆15Oct 28, 2017Updated 8 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- ☆17Aug 30, 2018Updated 7 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆13Aug 25, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 3 months ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- VBScript minifier☆25Apr 26, 2026Updated last week
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- A Burp Suite extension which performs checks for cross-domain scripting against the DOM, subresource integrity checks, and evaluates Java…☆26Mar 23, 2022Updated 4 years ago
- Certificate Export Utility☆26May 1, 2020Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- ☆10Jun 11, 2018Updated 7 years ago
- WireGuard VPN server GUI with Status page☆17Oct 5, 2021Updated 4 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago