IPvFletch / KiddoCTFLinks
CTF designed for Middle School-aged kids
☆12Updated last year
Alternatives and similar repositories for KiddoCTF
Users that are interested in KiddoCTF are comparing it to the libraries listed below
Sorting:
- Distributed Honeypot☆63Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 6 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- damn simple honey pot☆19Updated 9 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago
- Twintelligence is a free Twitter OSINT tool☆51Updated 5 years ago
- Graph visualization of wireless client and access point relationships☆117Updated 3 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Updated 4 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- ☆21Updated 9 years ago
- WIP - Revamped Alfred [2.0]☆40Updated 9 months ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆96Updated last year
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Updated 6 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Updated 9 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 13 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Updated last year
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Updated 11 years ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 5 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 5 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 8 years ago