Toolset for automating common management actions used in CTF's
☆41Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-bash-tools
Users that are interested in CTF-bash-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- https://pinkdraconian.gitbook.io/methodology/☆14Aug 24, 2021Updated 4 years ago
- All the cheatsheets a man could ever need☆32Mar 7, 2021Updated 5 years ago
- A web security research tool for DOM testing☆27Feb 7, 2026Updated 2 months ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Security Blogs - A simple aggregator for security news/blog☆26Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Oct 14, 2020Updated 5 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- ☆13Jul 8, 2020Updated 5 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Bulk IP to ASN submission to the Team Cymru Whois server. More info: http://www.team-cymru.org/IP-ASN-mapping.html☆15Oct 30, 2023Updated 2 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- A tool for unpacking ctf keyboard traffic☆17Jul 15, 2022Updated 3 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Jun 24, 2022Updated 3 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Jun 4, 2025Updated 11 months ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- ☆14Nov 3, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- This is GitHub_Dorks and some tips i collect from different resources.Recon_Api is tip when you find token or api without knowing what to…☆21Sep 15, 2021Updated 4 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Exploits for the TryHackMe room hackerNote☆31Feb 20, 2020Updated 6 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆16May 3, 2021Updated 5 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 12 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- Amazon AtoZ VET-Flex Bot for warehouse shifts.☆11Dec 17, 2024Updated last year
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 3 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago