wvu / metasploit-ctf-challengesLinks
Archive of Metasploit CTF challenges.
☆14Updated 3 years ago
Alternatives and similar repositories for metasploit-ctf-challenges
Users that are interested in metasploit-ctf-challenges are comparing it to the libraries listed below
Sorting:
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆36Updated last year
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- ☆122Updated 7 years ago
- Notes/Tools for pentesting☆79Updated 2 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆35Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- ☆152Updated 2 years ago
- ☆57Updated 5 years ago
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- Encrypted exploit delivery for the masses☆269Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 5 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- ☆159Updated 8 years ago
- ☆70Updated 3 months ago
- ☆96Updated 7 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- ☆22Updated 8 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 10 years ago
- ☆238Updated 5 years ago