RITSEC Weekly Labs
☆11Mar 3, 2019Updated 6 years ago
Alternatives and similar repositories for Spring-2019-Labs
Users that are interested in Spring-2019-Labs are comparing it to the libraries listed below
Sorting:
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Official challenge and writeup repository for RITSEC CTF 2018.☆16Nov 30, 2018Updated 7 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Various blog post projects.☆25Nov 21, 2025Updated 3 months ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- A proof of conept python implementation of a blockchain utlizing the PBFT consensus algorithm for IoT configuration updating☆31Jun 1, 2021Updated 4 years ago
- AI Agent for Threat Modeling☆13May 27, 2025Updated 9 months ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- ☆10Oct 22, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- MMORPG server emulator☆12Aug 26, 2018Updated 7 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- Archive of talk materials.☆11Mar 2, 2023Updated 2 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated last month
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago