tcbutler320 / ctf-playbookLinks
This project is no longer maintained
☆12Updated 5 years ago
Alternatives and similar repositories for ctf-playbook
Users that are interested in ctf-playbook are comparing it to the libraries listed below
Sorting:
- A curated list of resources for Cyber Professionals☆16Updated 4 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆154Updated 2 weeks ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆21Updated 5 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆148Updated 4 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- A collection of personal scripts used in hacking excercises.☆153Updated 5 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- OSCP cheatsheet☆107Updated last year
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆267Updated last week
- Cybersecurity Notes☆166Updated last year
- scylla.sh db dumps and more☆139Updated 5 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- A LateX template for penetration testing reports☆106Updated 6 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- A fast, efficient and lightweight (~100 KB) Capture The Flag framework inspired by the HackTheBox platform. Built with Flask.☆111Updated last year
- Sharing Various Things☆22Updated 3 years ago
- Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.☆94Updated 5 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆191Updated last year
- pentest-standard.org docs redesign☆47Updated 3 years ago
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆162Updated 4 years ago
- My OSCP notes☆223Updated last year
- ☆112Updated 5 years ago
- ☆56Updated 7 years ago
- Slides for my conference talks☆44Updated 2 years ago
- Tool to discover external and internal network attack surface☆203Updated last year