Đồ án môn học Web - khóa 18 - Đại học khoa học tự nhiên
☆21Feb 14, 2021Updated 5 years ago
Alternatives and similar repositories for WebCTT2
Users that are interested in WebCTT2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Kubernetes challenge type plugin for CTFd☆16Nov 21, 2025Updated 4 months ago
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- ☆13May 21, 2021Updated 4 years ago
- This repository contains a few of my writeups I made for the famous and addictive TryHackMe CTF (Capture The Flag) challenges.☆11Sep 19, 2021Updated 4 years ago
- Script that installs league of legends automagically!☆13Dec 14, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cracking RNG: Linear Congruential Generator☆17Jun 2, 2022Updated 3 years ago
- ☆13Feb 15, 2023Updated 3 years ago
- Tài liệu về CEPH☆20Apr 3, 2020Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆32Sep 1, 2018Updated 7 years ago
- This repositories has all the best out of Bests RATs the world has ever seen 😨 😈☆16May 23, 2020Updated 5 years ago
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆49Jul 28, 2025Updated 7 months ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Jul 25, 2021Updated 4 years ago
- A collection of advanced PHP and ASPX web shells designed to bypass security measures.☆63Feb 16, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.☆57Apr 8, 2025Updated 11 months ago
- Solutions (that we managed to find) for the 2021 PicoCTF☆167Jan 19, 2024Updated 2 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Jan 7, 2024Updated 2 years ago
- BrutDroid - Android Studio Pentest Automator: Streamline mobile pentesting with automated emulator rooting, Frida, and Burp Suite integra…☆585Jul 17, 2025Updated 8 months ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆765Aug 21, 2023Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆888May 3, 2023Updated 2 years ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆927May 7, 2025Updated 10 months ago
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,595Mar 1, 2026Updated 3 weeks ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,264Apr 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository has the JSON file required to perform user enumeration on various websites.☆2,411Mar 18, 2026Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,434Jan 19, 2025Updated last year
- Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more☆3,809Dec 5, 2024Updated last year
- Practical Ethical Hacking Labs 🗡🛡☆3,426Apr 23, 2024Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,805Jul 29, 2025Updated 7 months ago
- Reverse Engineer's Toolkit☆5,175May 1, 2025Updated 10 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,973Jul 12, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,698Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,838Mar 2, 2026Updated 3 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,454Updated this week
- The recursive internet scanner for hackers. 🧡☆9,538Updated this week
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆8,963Mar 18, 2026Updated last week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,352Updated this week
- 一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。(An intranet comprehensive scanning tool, enabling one-click automated, all-round vulnerability scanning)☆13,517Jan 31, 2026Updated last month
- Collection of handy online tools for developers, with great UX.☆37,723Mar 13, 2026Updated last week