Repository to index useful tools for CTF's
☆28Jan 26, 2026Updated last month
Alternatives and similar repositories for CTF-s-Tools
Users that are interested in CTF-s-Tools are comparing it to the libraries listed below
Sorting:
- ESP32-based BLE and WiFi scanner for real-time device discovery and tracking. Designed for network analysis and counter-surveillance.☆24Sep 16, 2025Updated 5 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- A simple select/event/time based Lemonbar manager.☆11Apr 3, 2021Updated 4 years ago
- print today's schedule☆10Mar 12, 2022Updated 3 years ago
- Read-only mirror of https://gitlab.gnome.org/GNOME/gcr☆12Feb 27, 2026Updated last week
- A light weight x86 32bit kernel☆25Dec 5, 2025Updated 3 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Example of an easy way to take cs notes☆11Mar 11, 2021Updated 4 years ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- Skeleton project for your own GRUB-based bootkit☆17Jan 11, 2020Updated 6 years ago
- ☆13Mar 12, 2022Updated 3 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- FHIR Android client example☆13Nov 20, 2015Updated 10 years ago
- state-of-the-art models for diacritics restoration for Arabic language☆17Feb 23, 2025Updated last year
- helps you find the cheapest electronic components in bab-el-louq☆12Aug 1, 2022Updated 3 years ago
- A tutorial on side channel leakage modelling using linear regression☆14Nov 20, 2017Updated 8 years ago
- Cosmo PDA Linux kernel v4.4 (for Debian)☆14Nov 15, 2023Updated 2 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- A simulation for a Von Nuemann based Computer Architecture using Java☆13Jun 19, 2022Updated 3 years ago
- GroupDocs.Metadata for .NET examples, plugins and showcase projects☆14Feb 3, 2026Updated last month
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- System tray indicator for managing storage devices☆16Jan 21, 2019Updated 7 years ago
- Open-source web & API security training platform with curated, modular labs and progress tracking.☆34Updated this week
- The main task of compressing PHP code, it is also possible to use as a simple PHP obfuscator.☆15Nov 13, 2018Updated 7 years ago
- Bountysource browser extension.☆13Nov 17, 2016Updated 9 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Mirror of https://gitlab.com/theopenstore/openstore-app☆13Mar 1, 2026Updated last week
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago