This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
☆2,895May 6, 2023Updated 2 years ago
Alternatives and similar repositories for ctf-katana
Users that are interested in ctf-katana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Katana - Automatic CTF Challenge Solver in Python3☆1,347Mar 7, 2024Updated 2 years ago
- List of tools and commands that may be helpful in CTFs☆354Oct 22, 2025Updated 5 months ago
- Fancy reverse and bind shell handler☆2,877Aug 9, 2024Updated last year
- Some setup scripts for security research tools.☆9,345Mar 1, 2026Updated last month
- A curated list of CTF frameworks, libraries, resources and softwares☆11,434Jul 22, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,884Mar 21, 2026Updated 3 weeks ago
- Collection of steganography tools - helps with CTF challenges☆2,657Nov 27, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,649Updated this week
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆580May 18, 2021Updated 4 years ago
- CTF framework and exploit development library☆13,353Updated this week
- Web CTF CheatSheet 🐈☆2,951Oct 28, 2025Updated 5 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,964Jan 28, 2026Updated 2 months ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,892Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tutorials for getting started with Pwntools☆1,564Oct 1, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,889Sep 6, 2023Updated 2 years ago
- CTF Cheatsheet☆132Apr 29, 2025Updated 11 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,881Dec 25, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,952Mar 1, 2026Updated last month
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,071Mar 8, 2026Updated last month
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,824Jun 8, 2019Updated 6 years ago
- CTFs as you need them☆6,603Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- detect stegano-hidden data in PNG & BMP☆1,557Jan 28, 2026Updated 2 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,830Apr 25, 2024Updated last year
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆814Nov 18, 2025Updated 4 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,283Updated this week
- Google CTF☆4,931Feb 11, 2026Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- ☆2,962Feb 8, 2026Updated 2 months ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,577Mar 14, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CTF challenge (mostly pwn) files, scripts etc☆2,464Feb 11, 2026Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,565Jan 18, 2026Updated 2 months ago
- A list of resources for those interested in getting started in bug bounties☆11,956Jul 23, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,141Updated this week
- A repository for learning various heap exploitation techniques.☆8,583Mar 26, 2026Updated 2 weeks ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,300Updated this week
- A set of security related tools☆686Mar 8, 2021Updated 5 years ago