taviso / ctftoolLinks
Interactive CTF Exploration Tool
☆1,661Updated 4 years ago
Alternatives and similar repositories for ctftool
Users that are interested in ctftool are comparing it to the libraries listed below
Sorting:
- Proof of concept for CVE-2019-0708☆1,179Updated 3 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,610Updated 6 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,227Updated last month
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- VirtualBox E1000 Guest-to-Host Escape☆1,415Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,331Updated 4 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆869Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆626Updated 5 years ago
- UAC bypass, Elevate, Persistence methods☆2,706Updated 2 years ago
- Proof of Concepts☆1,269Updated 10 months ago
- Proof of Concepts (PE, PDF...)☆1,529Updated 9 months ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- Windows Exploits☆1,288Updated 5 years ago
- Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute☆2,188Updated 6 years ago
- PowerShell ReverseTCP Shell - Framework☆1,055Updated 3 years ago
- ☆1,360Updated 5 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆902Updated 5 years ago
- A collection of links related to VMware escape exploits☆1,462Updated last year
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆913Updated 6 years ago
- MS17-010☆2,214Updated 2 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,409Updated last year
- My musings with PowerShell☆2,689Updated 3 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,577Updated last year
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,205Updated last year
- Vulnerability Labs for security analysis☆1,175Updated 4 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,860Updated last year
- Proofs-of-concept☆811Updated last year
- GTRS - Google Translator Reverse Shell☆620Updated last week