A Crypto-CTF Assistant For Saving You Time
☆18May 23, 2022Updated 3 years ago
Alternatives and similar repositories for dagger
Users that are interested in dagger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Install mostly used pentesting and CTF tools in Ubuntu 18.04 without adding any extra repository, preventing any crashes in repositories.☆15Apr 29, 2020Updated 6 years ago
- Check your website's responsive design quickly.☆16May 5, 2020Updated 5 years ago
- Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more☆14Nov 10, 2025Updated 5 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An Open Sourced CTF hosting platform written in php☆10May 24, 2015Updated 10 years ago
- Developer Student Club - DSC LPU Website.☆25Mar 2, 2021Updated 5 years ago
- ☆54Jan 22, 2025Updated last year
- ☆35Aug 15, 2020Updated 5 years ago
- ☆16Jun 7, 2020Updated 5 years ago
- E-Banking Website created by using HTML, CSS, JS, JQuery, Bootstrap, PHP, Laravel and MySQL☆25Dec 22, 2020Updated 5 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆75Sep 21, 2020Updated 5 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Some wrrite-ups☆18Feb 28, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆38Dec 10, 2023Updated 2 years ago
- ☆17Apr 15, 2020Updated 6 years ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆35Mar 4, 2021Updated 5 years ago
- Practice notes for problems and solutions learned from Head First Design Pattern book☆17Jun 12, 2023Updated 2 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Jun 8, 2021Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- Day by day Lots of Newbie Come into bug Bounty They ask Social Site about Bug Bounty Site, So That's why I open My Hunted All Site.☆32Sep 20, 2020Updated 5 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- check for username availability across popular sites☆19Jan 1, 2016Updated 10 years ago
- eJPT CheatSheet☆28Feb 4, 2021Updated 5 years ago
- ☆10Jun 6, 2022Updated 3 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆26Sep 4, 2021Updated 4 years ago
- Testing default web credentials☆34Dec 11, 2023Updated 2 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 6 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- ☆25May 24, 2022Updated 3 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SSL Pinning bypass using frida server for Mobile Application Penetration Testing☆15Jan 6, 2021Updated 5 years ago
- Cool resources and content for bug bounty hunting.☆19Oct 1, 2021Updated 4 years ago
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆32Dec 12, 2023Updated 2 years ago
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Updated this week
- Anyone can contribute in any domain! An open-source repository to contribute Learning Resources. Contribute to this repository as a part …☆10Dec 7, 2020Updated 5 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆38Dec 12, 2023Updated 2 years ago
- ☆40Jun 5, 2021Updated 4 years ago