IPvFletch / KiddoCTFLinks
CTF designed for Middle School-aged kids
☆11Updated 11 months ago
Alternatives and similar repositories for KiddoCTF
Users that are interested in KiddoCTF are comparing it to the libraries listed below
Sorting:
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 5 years ago
- Distributed Honeypot☆62Updated 7 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Graph visualization of wireless client and access point relationships☆117Updated 2 years ago
- damn simple honey pot☆18Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 9 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 9 months ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆99Updated last year
- Honeybadger Red Edition☆13Updated 8 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25Updated 6 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A simple capture the flag framework.☆122Updated 8 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆75Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 9 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆47Updated 9 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆34Updated 11 months ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last year
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆75Updated last month
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- A collection of fraud related tools for research.☆149Updated 6 years ago