tcbutler320 / ctf-playbook
This project is no longer maintained
☆12Updated 5 years ago
Alternatives and similar repositories for ctf-playbook
Users that are interested in ctf-playbook are comparing it to the libraries listed below
Sorting:
- My first trial at Ethical Hacking Write Ups☆21Updated 4 years ago
- The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.☆57Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆42Updated 4 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆37Updated 5 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- Slides for my conference talks☆43Updated last year
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Buffer Overflows☆29Updated 4 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆145Updated 4 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆82Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆150Updated 2 weeks ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- ☆44Updated 9 years ago
- My OSCP notes☆219Updated 9 months ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆18Updated 6 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- BurpSuite using the document and some extensions☆69Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆70Updated last month
- Trace Labs - Search Party CTF Writeups☆94Updated 5 months ago
- Test tool for CVE-2020-1472☆34Updated last year