takeshixx / ctfpwnngLinks
Automation framework for attack-defense CTFs.
☆15Updated 5 years ago
Alternatives and similar repositories for ctfpwnng
Users that are interested in ctfpwnng are comparing it to the libraries listed below
Sorting:
- Exploitation challenges for CTF☆63Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆20Updated 7 years ago
- public exploits☆35Updated 2 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- ☆46Updated 5 years ago
- ☆44Updated 6 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- ☆97Updated 3 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- ☆1Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago