Đồ án môn học Web - khóa 18 - Đại học khoa học tự nhiên
☆21Feb 14, 2021Updated 5 years ago
Alternatives and similar repositories for WebCTT2
Users that are interested in WebCTT2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ddos_tool_2025 – Powerful open‑source framework for stress testing & DDoS resilience. Supports multi‑layer attacks (L3/L4/L7), Cloudflare…☆22Jul 30, 2025Updated 9 months ago
- Cracking RNG: Linear Congruential Generator☆17Jun 2, 2022Updated 3 years ago
- Tài liệu về CEPH☆20Apr 3, 2020Updated 6 years ago
- Python script for finding resource tags without subresource integrity.☆42Apr 19, 2026Updated 2 weeks ago
- Collections of CTF-WEB-challs mainly for review purpose.☆30Jul 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Solutions (that we managed to find) for the 2021 PicoCTF☆167Jan 19, 2024Updated 2 years ago
- Powershell攻击指南----黑客后渗透之道☆863Jul 10, 2020Updated 5 years ago
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,664Apr 26, 2026Updated last week
- CTF Archives: Collection of CTF Challenges.☆1,435Updated this week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,282Apr 12, 2024Updated 2 years ago
- Writeups for HacktheBox 'boot2root' machines☆2,030Sep 1, 2023Updated 2 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,508Mar 14, 2026Updated last month
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,451Jan 19, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more☆3,896Dec 5, 2024Updated last year
- Practical Ethical Hacking Labs 🗡🛡☆3,450Apr 23, 2024Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,897Updated this week
- OSCP Cheat Sheet☆3,721Updated this week
- Reverse Engineer's Toolkit☆5,190May 1, 2025Updated last year
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,999Jul 12, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Apr 28, 2026Updated last week
- A list of web application security☆6,833Apr 28, 2026Updated last week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,620Apr 28, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆9,169Apr 24, 2026Updated last week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,576Apr 23, 2026Updated last week
- 🌐 The Internet Computer! Free, Open-Source, and Self-Hostable.☆40,912Updated this week
- 🕵️♂️ Collect a dossier on a person by username from 3000+ sites☆21,966Updated this week
- Collection of handy online tools for developers, with great UX.☆38,340Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,024Oct 6, 2025Updated 7 months ago
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆15,832Mar 26, 2026Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,768Updated this week
- Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia)☆43,443Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Easy to maintain open source documentation websites.☆64,753Apr 28, 2026Updated last week
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆26,179Updated this week
- Automatic SQL injection and database takeover tool☆37,167Apr 24, 2026Updated last week
- A progressive Node.js framework for building efficient, scalable, and enterprise-grade server-side applications with TypeScript/JavaScrip…☆75,341Updated this week
- Python tool for converting files and office documents to Markdown.☆119,095Apr 20, 2026Updated 2 weeks ago
- The Node.js best practices list (July 2024)☆105,247Apr 15, 2025Updated last year
- A feature-rich command-line audio/video downloader☆160,142Updated this week