A composite list of various vulnerabilities and tools to look for and use while exploiting common CTF challenges
☆62Apr 4, 2023Updated 2 years ago
Alternatives and similar repositories for CTF-Checklist
Users that are interested in CTF-Checklist are comparing it to the libraries listed below
Sorting:
- Killer Queen's writeups for the picoCTF 2021 Competition☆21Jun 3, 2021Updated 4 years ago
- CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具☆14May 22, 2023Updated 2 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 5 months ago
- TCP1P CTF writeup☆32May 23, 2023Updated 2 years ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆89Feb 14, 2026Updated last month
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- ☆33Apr 23, 2023Updated 2 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Minimalist resources to learn about **OSINT**, tips, tools, and others..☆28Oct 27, 2022Updated 3 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 5 years ago
- ☆16Aug 2, 2025Updated 7 months ago
- forked from https://github.com/apsdehal/awesome-ctf.git☆45Oct 10, 2020Updated 5 years ago
- Decrypt TP-Link Firmware☆36Oct 5, 2025Updated 5 months ago
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆808Nov 18, 2025Updated 4 months ago
- Switch between two running operating systems without losing their state.☆58Jan 2, 2026Updated 2 months ago
- ☆45Nov 23, 2025Updated 3 months ago
- reverse shell usb DigiSpark using board DigiKeyboard.h, command controlled with server TCP & UDP connections netcat listener on port 4444…☆12Jun 30, 2022Updated 3 years ago
- 🎵 Official source code and writeups for SekaiCTF 2023!☆145Aug 20, 2025Updated 7 months ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago
- My CTF write-ups☆28Dec 21, 2021Updated 4 years ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43May 22, 2025Updated 10 months ago
- Python tools for Quantum AI Crypt☆12Sep 21, 2019Updated 6 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- ☆13Jul 23, 2023Updated 2 years ago
- Awesome Blog Template For Tech-er☆13Jan 28, 2026Updated last month
- ctfcup2023-quals☆10Oct 31, 2023Updated 2 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆70Jul 5, 2025Updated 8 months ago
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- ☆10Jan 26, 2023Updated 3 years ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 10 months ago
- ☆23Sep 10, 2022Updated 3 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- X-overdos is a A tool for performing DoS attack tests with many methods such as Layer 2, Layer 4, and also Layer 7.☆11Oct 16, 2025Updated 5 months ago
- Convert all valid keys from flipperzero-goodies to rfid/ibutton fuzzer format☆17Jul 30, 2023Updated 2 years ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year