ARBCTF / resourcesLinks
Useful books, links, blogs, etc.
☆14Updated 7 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- Miscellaneous analysis tools☆26Updated 10 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated 10 months ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆39Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago