tcbutler320 / ctf-playbookLinks
This project is no longer maintained
☆12Updated 5 years ago
Alternatives and similar repositories for ctf-playbook
Users that are interested in ctf-playbook are comparing it to the libraries listed below
Sorting:
- A curated list of resources for Cyber Professionals☆16Updated 4 years ago
- OSCP cheatsheet☆107Updated last year
- Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.☆95Updated 5 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 5 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- My first trial at Ethical Hacking Write Ups☆22Updated 5 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobs☆133Updated 5 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Updated 6 years ago
- A collection of personal scripts used in hacking excercises.☆153Updated 5 years ago
- A LateX template for penetration testing reports☆106Updated 6 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Slides for my conference talks☆44Updated 2 years ago
- A fast, efficient and lightweight (~100 KB) Capture The Flag framework inspired by the HackTheBox platform. Built with Flask.☆111Updated last year
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆148Updated 4 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆191Updated last year
- links collected from SOC Core Skills class☆85Updated 4 years ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆196Updated 2 years ago
- This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can dail…☆175Updated last year
- OWASP Honeypot, Automated Deception Framework.☆469Updated last year
- My OSCP notes☆225Updated last year
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- A random set of 5 machines for OSCP☆167Updated 5 years ago
- Useful resources about phishing email analysis☆87Updated 9 months ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Run several volatility plugins at the same time☆115Updated 3 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆156Updated last month