From 772a0ed63cc14c21ce49ac85750de4605ed04d74 Mon Sep 17 00:00:00 2001 From: Meitar M Date: Tue, 24 Mar 2020 22:24:31 -0400 Subject: [PATCH] Add Tavis Ormandy's Windows `ctftool` exploration/exploit tool. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 1b7297c..d9f21a3 100644 --- a/README.md +++ b/README.md @@ -808,6 +808,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing). * [Bloodhound](https://github.com/adaptivethreat/Bloodhound/wiki) - Graphical Active Directory trust relationship explorer. * [Commando VM](https://github.com/fireeye/commando-vm) - Automated installation of over 140 Windows software packages for penetration testing and red teaming. * [Covenant](https://github.com/cobbr/Covenant) - ASP.NET Core application that serves as a collaborative command and control platform for red teamers. +* [ctftool](https://github.com/taviso/ctftool) - Interactive Collaborative Translation Framework (CTF) exploration tool capable of launching cross-session edit session attacks. * [DeathStar](https://github.com/byt3bl33d3r/DeathStar) - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments. * [Empire](https://www.powershellempire.com/) - Pure PowerShell post-exploitation agent. * [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel.