Useful tools for CTF competitions
☆34Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for toolset
Users that are interested in toolset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VoidHack CTF write-ups☆60Mar 9, 2019Updated 7 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- ☆70Jun 27, 2025Updated 10 months ago
- Sharing is caring. CTF challenge writeups☆32Apr 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 7 years ago
- A tool to encode and decode content as whitespace☆20Sep 24, 2023Updated 2 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- ☆14Aug 25, 2018Updated 7 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- my dotfiles☆13Oct 5, 2025Updated 7 months ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- [Forked] This repo is for learning various heap exploitation techniques.☆10Sep 6, 2018Updated 7 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A simple single page application to automate building cards for deck building games☆12Aug 14, 2017Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Useful tips by OTA CTF members☆153Oct 5, 2019Updated 6 years ago
- Web Exploitation Workflow for CTF Challenges☆54Dec 11, 2016Updated 9 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Multi-threading brainfuck compiler☆11Dec 10, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- PeekFx allows loading and decompilation of groups of .NET framework assemblies.☆29Feb 1, 2023Updated 3 years ago
- A free bookmarklet password generator.☆13May 31, 2014Updated 11 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 3 years ago
- ☆36Jan 22, 2025Updated last year
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆13Aug 25, 2021Updated 4 years ago
- The collection of all Python program from various CTF's☆26Oct 11, 2015Updated 10 years ago
- A training CTF covering non-blind SQL injection techniques☆73Jan 10, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Large public A&D training on 2018-11-04☆24Jun 1, 2021Updated 4 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 7 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 8 years ago