This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
☆2,896May 6, 2023Updated 2 years ago
Alternatives and similar repositories for ctf-katana
Users that are interested in ctf-katana are comparing it to the libraries listed below
Sorting:
- Katana - Automatic CTF Challenge Solver in Python3☆1,346Mar 7, 2024Updated 2 years ago
- List of tools and commands that may be helpful in CTFs☆350Oct 22, 2025Updated 5 months ago
- Fancy reverse and bind shell handler☆2,873Aug 9, 2024Updated last year
- Some setup scripts for security research tools.☆9,333Mar 1, 2026Updated 3 weeks ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,355Jul 22, 2024Updated last year
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,838Mar 2, 2026Updated 2 weeks ago
- Collection of steganography tools - helps with CTF challenges☆2,644Nov 27, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆579May 18, 2021Updated 4 years ago
- CTF framework and exploit development library☆13,315Mar 5, 2026Updated 2 weeks ago
- Web CTF CheatSheet 🐈☆2,946Oct 28, 2025Updated 4 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,943Jan 28, 2026Updated last month
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,816Mar 3, 2026Updated 2 weeks ago
- Tutorials for getting started with Pwntools☆1,549Oct 1, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,539Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,860Sep 6, 2023Updated 2 years ago
- CTF Cheatsheet☆127Apr 29, 2025Updated 10 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,867Dec 25, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 3 weeks ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,065Mar 8, 2026Updated 2 weeks ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,823Jun 8, 2019Updated 6 years ago
- CTFs as you need them☆6,569Mar 12, 2026Updated last week
- detect stegano-hidden data in PNG & BMP☆1,547Jan 28, 2026Updated last month
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆808Nov 18, 2025Updated 4 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,197Mar 16, 2026Updated last week
- Google CTF☆4,921Feb 11, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- ☆2,946Feb 8, 2026Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,568Mar 14, 2026Updated last week
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- CTF challenge (mostly pwn) files, scripts etc☆2,435Feb 11, 2026Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,541Jan 18, 2026Updated 2 months ago
- A list of resources for those interested in getting started in bug bounties☆11,906Jul 23, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,050Updated this week
- A repository for learning various heap exploitation techniques.☆8,475Jan 15, 2026Updated 2 months ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,254Mar 5, 2025Updated last year
- A set of security related tools☆686Mar 8, 2021Updated 5 years ago