utahsaint-org / Hackers-Challenge-Walkthroughs
A collection of player contributed walkthroughs for Hackers Challenge puzzles
☆30Updated last year
Alternatives and similar repositories for Hackers-Challenge-Walkthroughs
Users that are interested in Hackers-Challenge-Walkthroughs are comparing it to the libraries listed below
Sorting:
- ☆8Updated 7 years ago
- A Go client for crobat☆24Updated 5 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Updated 5 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆28Updated last year
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Updated 5 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 6 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- Code snippets from my blog☆25Updated 2 years ago
- Nix Audit made easier (RHEL, CentOS)☆64Updated 3 weeks ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 8 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Custom slash command to do a basic nmap scan from within Slack☆25Updated 9 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A static website template for security pages.☆51Updated 8 months ago
- Spam Honeypot Tool☆26Updated 8 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 4 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 4 months ago
- Used to manage burp extensions that I find useful.☆11Updated 3 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago