skylab-kulubu / SKYDAYS-CTF-25View external linksLinks
SKYDAYS CTF 2025
☆16Mar 20, 2025Updated 10 months ago
Alternatives and similar repositories for SKYDAYS-CTF-25
Users that are interested in SKYDAYS-CTF-25 are comparing it to the libraries listed below
Sorting:
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆36Sep 16, 2024Updated last year
- ☆12Jan 7, 2023Updated 3 years ago
- Koth - a repository with cheat-sheet Koth in THM (Try Hack Me)☆12Aug 7, 2023Updated 2 years ago
- Soothing pastel theme for QTerminal☆20Mar 30, 2025Updated 10 months ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- RPC++ is a tool for Discord RPC (Rich Presence) to let your friends know about your Linux system☆25Nov 9, 2023Updated 2 years ago
- Öncelikle bu sheller pek bir hacker tarafında bulunan sheller değildir.Özel kodlanmış c99 shelldir.Bu private c99 shell ile sunucudaki si…☆28May 23, 2015Updated 10 years ago
- These are beginner CTF questions for the Forensic and Security Technology club at Cal Poly Pomona.☆29May 8, 2024Updated last year
- Nextcloud Jitsi Integration☆40Jan 26, 2026Updated 3 weeks ago
- ☆50Sep 8, 2023Updated 2 years ago
- Soho vibes for Waybar☆57Nov 5, 2025Updated 3 months ago
- Metamod plugin that allows protocol 47 and 48 non-steam clients to connect to ReHLDS servers☆60Aug 12, 2025Updated 6 months ago
- ☆57Feb 12, 2023Updated 3 years ago
- Osquery Resources☆63Aug 23, 2019Updated 6 years ago
- TryHackMe rooms, tips and tricks, and other CTF writeups☆133Sep 1, 2025Updated 5 months ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆189Jan 19, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆249Mar 21, 2024Updated last year
- Koth - TryHackMe Tricks☆190Nov 5, 2023Updated 2 years ago
- All About CTFs☆265May 16, 2023Updated 2 years ago
- Soho vibes for GTK☆318Nov 5, 2025Updated 3 months ago
- GTK Theme with Catppuccin colour scheme☆675Oct 23, 2025Updated 3 months ago
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆3,095Jan 10, 2026Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,831Dec 29, 2025Updated last month
- Active Directory certificate abuse.☆1,912Oct 27, 2025Updated 3 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,814Feb 17, 2025Updated last year
- SMBMap is a handy SMB enumeration tool☆2,015Jan 6, 2026Updated last month
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,239Jan 8, 2026Updated last month
- Semi-automatic OSINT framework and package manager☆2,384Jan 31, 2025Updated last year
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,453Nov 16, 2024Updated last year
- Crack Interface lockscreen, Metasploit and More Android/IOS Hacking☆2,828Mar 12, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,289Feb 1, 2026Updated 2 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,740Oct 20, 2023Updated 2 years ago
- A repository of sysmon configuration modules☆2,968Aug 21, 2024Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,286Updated this week
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,191Feb 15, 2023Updated 3 years ago
- Tools and Techniques for Blue Team / Incident Response☆3,925Mar 27, 2025Updated 10 months ago
- Privilege Escalation Enumeration Script for Windows☆3,685Jan 30, 2026Updated 2 weeks ago