Toolset for automating common management actions used in CTF's
☆41Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-bash-tools
Users that are interested in CTF-bash-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- https://pinkdraconian.gitbook.io/methodology/☆13Aug 24, 2021Updated 4 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month
- ☆14Sep 23, 2023Updated 2 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆43Feb 27, 2026Updated 3 weeks ago
- ☆27Apr 9, 2022Updated 3 years ago
- Wireshark configuration profile for Zigbee traffic☆15May 5, 2022Updated 3 years ago
- A tool for unpacking ctf keyboard traffic☆17Jul 15, 2022Updated 3 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆10Jul 3, 2021Updated 4 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- ☆37Jul 25, 2019Updated 6 years ago
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- ☆16May 3, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- Source Code for 'Foundations of ARM64 Linux Debugging, Disassembling, and Reversing' by Dmitry Vostokov☆15Jan 20, 2023Updated 3 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to enumerate and exploit SQL Servers in AD☆33Aug 21, 2023Updated 2 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- ☆14May 22, 2024Updated last year