Orange-Cyberdefense / ctf-partyView external linksLinks
A library to enhance and speed up script/exploit writing for CTF players
☆41Jul 8, 2020Updated 5 years ago
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below
Sorting:
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- Repository of CVE found by OCD people☆84Jun 19, 2025Updated 7 months ago
- Tools about security.txt for Ruby☆20Oct 14, 2023Updated 2 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- A self hosted yopmail like server running in a docker☆66Mar 6, 2024Updated last year
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Non-Alphanumeric Ruby for Fun and Not Much Else☆22Mar 19, 2014Updated 11 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- 🦊A cloudflare DNS over HTTPs resolver client library.☆12Jan 10, 2023Updated 3 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 10 months ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Detect the server side language used for the website☆13Mar 23, 2021Updated 4 years ago
- auto MITM attack tools☆13Oct 11, 2023Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- CATANA - CUT your Wordlist!☆15Oct 2, 2022Updated 3 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- ☆14Sep 19, 2024Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- CyberChef update scripts in PowerShell & Bash☆17Apr 22, 2024Updated last year
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆13May 31, 2019Updated 6 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 6 years ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- Patch for the emulation of Octeon MIPS64 in QEMU☆15Feb 2, 2018Updated 8 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- ☆25Jul 19, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago