☆23Nov 22, 2025Updated 4 months ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 9 months ago
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply …☆29Apr 5, 2026Updated last week
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆14Nov 8, 2025Updated 5 months ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 3 months ago
- Installation guide for bWAPP on Kali Linux, Ubuntu, and Windows.☆15Sep 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- A boilerplate for dApps on Lisk☆12Jul 3, 2025Updated 9 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- The world's no 1 classroom for incubating AI talent. 4 months of hands-on, no-BS technical training in ML, LLMs and Production AI enginee…☆35Dec 6, 2025Updated 4 months ago
- Here you can find configs to your hyprland DE☆18Nov 13, 2025Updated 5 months ago
- ☆15Jun 27, 2025Updated 9 months ago
- Library for shellcode injection☆16Mar 21, 2025Updated last year
- Basic tool for Information Gathering 🚀☆24Mar 26, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆24Sep 23, 2024Updated last year
- Yet another reconnaissance tool☆20Jul 23, 2025Updated 8 months ago
- How to get started with cyber security made easy and cost-effective☆48Nov 11, 2025Updated 5 months ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Updated this week
- ☆10Jan 23, 2023Updated 3 years ago
- LinkedIn Women in Tech High School Trainee Program☆21Sep 19, 2017Updated 8 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆54Jul 1, 2024Updated last year
- ☆19Dec 30, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Dec 28, 2024Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆41May 31, 2023Updated 2 years ago
- Simple script to install ollama in termux☆49Oct 17, 2025Updated 5 months ago
- Active Directory information dumper via ADWS for evasion purposes.☆213Feb 23, 2026Updated last month
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆26Dec 16, 2023Updated 2 years ago
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- ☆52Jan 11, 2023Updated 3 years ago
- Things we learned from Capture The Flag hacking competitions we participated in☆22Mar 15, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.☆26Apr 11, 2021Updated 5 years ago
- HERE COMPLETE DSA QUESTIONS RELATED TO COMPETETIVE PROGRAMMING AND INTERNSHIP/PLACEMENTS☆18Aug 27, 2021Updated 4 years ago
- Resources for ethical hacking/penetration testers.☆15Jun 23, 2021Updated 4 years ago
- Caesar Cipher☆35Oct 8, 2025Updated 6 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 2 months ago
- Plasma Wallpaper Plugin (also Screen Lock) with growing city animation☆32May 14, 2025Updated 10 months ago
- My own tailored roadmap, to my web3 / smart contract auditor knowledge.☆52Jun 14, 2023Updated 2 years ago