Walkthrough some CTFs
☆51Oct 3, 2020Updated 5 years ago
Alternatives and similar repositories for CTFs
Users that are interested in CTFs are comparing it to the libraries listed below
Sorting:
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last month
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 7 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆447Aug 7, 2020Updated 5 years ago
- grok patterns for Asterisk log file☆13Oct 15, 2012Updated 13 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆87Jun 13, 2019Updated 6 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆11Mar 2, 2020Updated 6 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Small CTF challenges running on Docker☆158Jul 26, 2018Updated 7 years ago
- A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.☆10Oct 30, 2016Updated 9 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 8 months ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Nov 6, 2017Updated 8 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago