CTF problems for the practice of Beginners in Cyber Forensics.
☆37Feb 14, 2026Updated 2 months ago
Alternatives and similar repositories for CTF-Practice
Users that are interested in CTF-Practice are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Advanced information gathering & OSINT tool for phone numbers☆23Dec 16, 2019Updated 6 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆65Aug 30, 2022Updated 3 years ago
- Automating the SQL Injection through Google dorks.☆24Sep 30, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Write ups to the CTF problems online.☆14Mar 17, 2022Updated 4 years ago
- Python Digital Forensics Cookbook, published by Packt☆110Jan 18, 2023Updated 3 years ago
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- Python scripts using PIL and images2GIF to make animated generative art☆12Sep 2, 2016Updated 9 years ago
- Cross-platform process dependency monitor with GUI☆10Feb 23, 2026Updated 2 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Solutions to coding challenges (Leetcode, Hackerrank, Hackerearth etc)☆28Mar 31, 2021Updated 5 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 3 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.☆32Oct 7, 2019Updated 6 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆12Jun 20, 2020Updated 5 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- A lightweight, python implementation of onion routing used by tor. This is a proof of concept where the user enters a web url on the comm…☆12Dec 26, 2022Updated 3 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆13Feb 4, 2022Updated 4 years ago
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 4 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆35Mar 4, 2021Updated 5 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆15May 29, 2022Updated 3 years ago
- This repo includes all my codings, analytics and documentation for my AWS DeepRacer Competition☆11Oct 4, 2023Updated 2 years ago
- Paid Udemy Courses with Coupons☆28Mar 24, 2022Updated 4 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pneumatic walking, driving and wall climbing robot☆15Jan 12, 2025Updated last year
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- A small bash script that allows remote oscap scanning through ssh, similar to what SCAP Workbench does.☆11Apr 18, 2015Updated 11 years ago
- Cheat sheet about stuff others might find interesting☆14Dec 10, 2021Updated 4 years ago
- ☆21May 10, 2017Updated 8 years ago
- CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)☆11Nov 30, 2023Updated 2 years ago