Skip to content
#

ctf

Here are 161 public repositories matching this topic...

SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

  • Updated May 15, 2024
  • Shell

This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running be…

  • Updated Sep 25, 2020
  • Shell

BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p

  • Updated Nov 23, 2017
  • Shell

Improve this page

Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."

Learn more