Interactive CTF Exploration Tool
☆1,666Sep 17, 2021Updated 4 years ago
Alternatives and similar repositories for ctftool
Users that are interested in ctftool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- PowerShell ReverseTCP Shell - Framework☆1,065Sep 18, 2022Updated 3 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆405Jun 6, 2020Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,187Mar 16, 2026Updated 3 weeks ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,744Jan 16, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,582Jan 5, 2021Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,351Dec 7, 2020Updated 5 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆748Dec 11, 2023Updated 2 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Apr 9, 2019Updated 7 years ago
- ☆1,386Jul 2, 2020Updated 5 years ago
- 免杀webshell无限生成工具☆1,286Apr 3, 2020Updated 6 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,437Jul 20, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows Exploit Suggester - Next Generation☆4,817Apr 2, 2026Updated last week
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆364Jan 11, 2020Updated 6 years ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- Red Team Tool Kit☆1,132Dec 8, 2022Updated 3 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,560Oct 16, 2025Updated 5 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- A collection of pentest and development tips☆1,128May 26, 2022Updated 3 years ago
- 增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持☆967Jun 16, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 6 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,631Jun 11, 2021Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Jun 13, 2020Updated 5 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆333May 3, 2020Updated 5 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆683May 9, 2019Updated 6 years ago
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆810Aug 28, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆867Jul 21, 2019Updated 6 years ago
- Process Injection☆769Oct 24, 2021Updated 4 years ago
- Redis 4.x/5.x RCE☆978Nov 30, 2021Updated 4 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,524Jul 8, 2025Updated 9 months ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,277Nov 6, 2025Updated 5 months ago