Run Capture the Flags and Security Trainings with OWASP WrongSecrets
☆55Updated this week
Alternatives and similar repositories for wrongsecrets-ctf-party
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below
Sorting:
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- ☆19Mar 9, 2021Updated 4 years ago
- ☆16Oct 18, 2024Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 8 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- ☆18Apr 16, 2022Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 8 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- ☆18Mar 26, 2024Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆22May 19, 2025Updated 9 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆87Dec 29, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated 3 weeks ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 5 months ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- BYOVD collection☆24Mar 20, 2024Updated last year
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- ☆28Apr 4, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago