wlayzz / RopstenCtfLinks
RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.
☆17Updated 3 years ago
Alternatives and similar repositories for RopstenCtf
Users that are interested in RopstenCtf are comparing it to the libraries listed below
Sorting:
- Recon scripts for Red Team and Web blackbox auditing☆26Updated last week
- Python code to Serialize and Unserialize java binary serialization format.☆23Updated last month
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 7 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆21Updated last year
- A list of weird comparison in SQL☆15Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 6 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- Custom queries list for BloodHound☆29Updated last month
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆13Updated 10 months ago
- ☆91Updated 7 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆26Updated 6 months ago
- Exploits written while preparing for the OSED exam☆24Updated last year
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 6 months ago
- ☆12Updated last year
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- ☆42Updated 3 years ago
- A Python script to backup all repos (public or private) of a user.☆20Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- ☆16Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- Scripts that automate portions of pentests.☆52Updated 3 weeks ago
- ☆38Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆66Updated 3 weeks ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 7 months ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆38Updated 3 years ago