☆18Nov 25, 2025Updated 4 months ago
Alternatives and similar repositories for CTF-Write-Ups
Users that are interested in CTF-Write-Ups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official TrueLayer .NET library provides convenient access to TrueLayer APIs from applications built with .NET.☆15Feb 2, 2026Updated last month
- Like DLP☆11Jan 27, 2025Updated last year
- Notes taken from Android App Hacking - Black Belt Edition (UDEMY - Roman Stuehler)☆24May 19, 2024Updated last year
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- this my repo with notes i take in penetration testing☆29Feb 14, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This project aims to provide a comprehensive resource for understanding and testing Cross-Site Scripting (XSS) vulnerabilities, one of th…☆54Jan 10, 2026Updated 2 months ago
- DoomScope framework - Automated Web Security/Recon Scanner☆87Dec 22, 2025Updated 3 months ago
- ☆19Feb 10, 2024Updated 2 years ago
- ☆20Aug 27, 2025Updated 6 months ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- ☆12Apr 20, 2025Updated 11 months ago
- Invisibility Cloak with OpenCV A Python project that recreates the invisibility cloak effect by detecting a target color (red) in real-ti…☆20Aug 21, 2025Updated 7 months ago
- Collection of templates from various resources☆43Dec 5, 2025Updated 3 months ago
- Some wordlists collected form github to all bug bounty hunters.☆40Jul 30, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆19Sep 1, 2022Updated 3 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆36Dec 8, 2023Updated 2 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- ☆26Feb 21, 2026Updated last month
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- This repo contains Machines and Notes for practicing for EJPTv2 & CJCA exams☆151Jan 9, 2026Updated 2 months ago
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- ☆63Jul 14, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- ☆23Jan 27, 2026Updated last month
- Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual …☆68Mar 3, 2026Updated 3 weeks ago
- XSS Bypass☆30Feb 15, 2024Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆74May 5, 2022Updated 3 years ago
- ☆20Mar 4, 2025Updated last year
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- 🤖 Small python scripts to crawl data from FIT (Facebook, Instagram, Twitter)☆11Jan 20, 2022Updated 4 years ago
- A resources for who want to learn and get deep into client-side bugs☆426Dec 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Mar 3, 2025Updated last year
- Passively check for XSS character encodings☆18Mar 9, 2026Updated 2 weeks ago
- Defending against malicious USB firmware in the Linux kernel☆17Mar 8, 2016Updated 10 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆36Sep 4, 2025Updated 6 months ago
- ☆21Mar 7, 2024Updated 2 years ago