Katana - Automatic CTF Challenge Solver in Python3
☆1,350Mar 7, 2024Updated 2 years ago
Alternatives and similar repositories for katana
Users that are interested in katana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,899May 6, 2023Updated 2 years ago
- Fancy reverse and bind shell handler☆2,883Aug 9, 2024Updated last year
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆580May 18, 2021Updated 4 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,681Updated this week
- Katana - Automatic CTF Challenge Solver in Python3☆12Mar 17, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CTF framework and exploit development library☆13,360Apr 7, 2026Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,971Jan 28, 2026Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,854Apr 8, 2026Updated last week
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,899Mar 21, 2026Updated 3 weeks ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- Collection of steganography tools - helps with CTF challenges☆2,659Nov 27, 2022Updated 3 years ago
- Some setup scripts for security research tools.☆9,355Mar 1, 2026Updated last month
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,322Updated this week
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,079Mar 8, 2026Updated last month
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆183Oct 7, 2019Updated 6 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,451Jul 22, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,631Apr 9, 2026Updated last week
- Tutorials for getting started with Pwntools☆1,564Oct 1, 2024Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,939Sep 23, 2022Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,882Dec 25, 2023Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19,610Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Monitor linux processes without root permissions☆5,959Mar 1, 2026Updated last month
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,916Apr 7, 2026Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,168Updated this week
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,822Jun 8, 2019Updated 6 years ago
- Things we learned from Capture The Flag hacking competitions we participated in.☆262May 21, 2021Updated 4 years ago
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- CTFs as you need them☆6,612Updated this week
- Writeup for the challenges in NahamCon CTF 2020☆81Aug 3, 2020Updated 5 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,455Mar 11, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,199Apr 10, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,676Updated this week
- Web CTF CheatSheet 🐈☆2,951Oct 28, 2025Updated 5 months ago
- Fast web fuzzer written in Go☆15,894Apr 24, 2025Updated 11 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆595Apr 10, 2026Updated last week
- The ultimate WinRM shell for hacking/pentesting☆5,339Mar 10, 2026Updated last month
- Google CTF☆4,937Feb 11, 2026Updated 2 months ago