A library to enhance and speed up script/exploit writing for CTF players
☆41Jul 8, 2020Updated 5 years ago
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below
Sorting:
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- Repository of CVE found by OCD people☆84Jun 19, 2025Updated 8 months ago
- Tools about security.txt for Ruby☆20Oct 14, 2023Updated 2 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- A self hosted yopmail like server running in a docker☆66Mar 6, 2024Updated 2 years ago
- Non-Alphanumeric Ruby for Fun and Not Much Else☆21Mar 19, 2014Updated 11 years ago
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆18May 27, 2022Updated 3 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Detect the server side language used for the website☆13Mar 23, 2021Updated 4 years ago
- auto MITM attack tools☆14Oct 11, 2023Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- CATANA - CUT your Wordlist!☆16Oct 2, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- CyberChef update scripts in PowerShell & Bash☆17Apr 22, 2024Updated last year
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆13May 31, 2019Updated 6 years ago
- ☆14Sep 19, 2024Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Apr 7, 2024Updated last year
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Patch for the emulation of Octeon MIPS64 in QEMU☆15Feb 2, 2018Updated 8 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 6 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- ☆25Jul 19, 2024Updated last year
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago