securinets-insat / Friendly-CTF-2024Links
Challenges, flags, solvers and writeups for the Securinets INSAT Friendly CTF edition 2024.
☆18Updated 8 months ago
Alternatives and similar repositories for Friendly-CTF-2024
Users that are interested in Friendly-CTF-2024 are comparing it to the libraries listed below
Sorting:
- A collection of CTF write-ups focusing on web exploitation and OSINT challenges. Explore solutions, techniques, and insights from various…☆9Updated 3 months ago
- This is Command and Control (C2) Framework (cli / c2-server / implant)☆17Updated 9 months ago
- ☆35Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 4 months ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated last month
- Challenges binaries and solutions☆4Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆62Updated last week
- 🧞♂️ malware analysis☆36Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- ⚠️ Malware Development training ⚠️☆32Updated 4 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆33Updated 2 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆47Updated 3 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- Reverse Shell - technique is commonly used in cyber attacks☆16Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 11 months ago
- execute PE in memory Filelessly☆43Updated 4 months ago
- Its still same but i added a webcamshot skill and more browser.☆6Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆19Updated 8 months ago
- ☆41Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆83Updated 3 weeks ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆70Updated this week
- Notes for red teamers - from cloud to Active Directory to many things in between.☆59Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆30Updated this week
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆58Updated 2 weeks ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago