JohnHammond / ctf-katana
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
☆2,709Updated 2 years ago
Alternatives and similar repositories for ctf-katana:
Users that are interested in ctf-katana are comparing it to the libraries listed below
- Katana - Automatic CTF Challenge Solver in Python3☆1,303Updated last year
- Writeups for HacktheBox 'boot2root' machines☆1,955Updated last year
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,341Updated 3 months ago
- Fancy reverse and bind shell handler☆2,738Updated 9 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,097Updated 2 weeks ago
- 🎯 Command Injection Payload List☆3,262Updated 9 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,592Updated last year
- Collection of steganography tools - helps with CTF challenges☆2,512Updated 2 years ago
- Tutorials for getting started with Pwntools☆1,463Updated 7 months ago
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆563Updated 3 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,300Updated 4 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,394Updated 2 years ago
- ☆2,428Updated 9 months ago
- Everything needed for doing CTFs☆728Updated last year
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,722Updated 4 years ago
- Some setup scripts for security research tools.☆8,869Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,620Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,352Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,585Updated 6 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,442Updated last month
- Writeups for various CTFs☆640Updated 10 months ago
- A script that you can run in the background!☆2,840Updated 9 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,533Updated 8 months ago
- Web CTF CheatSheet 🐈☆2,766Updated last month
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆668Updated last month
- Ctf solutions from p4 team☆1,804Updated 7 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆785Updated 2 years ago
- CTF Cheatsheet☆76Updated last week
- Windows / Linux Local Privilege Escalation Workshop☆1,948Updated 2 years ago
- CTF challenge (mostly pwn) files, scripts etc☆1,877Updated 4 months ago