abs0lut3pwn4g3 / RTB-CTF-FrameworkView external linksLinks
A fast, efficient and lightweight (~100 KB) Capture The Flag framework inspired by the HackTheBox platform. Built with Flask.
☆110Mar 20, 2024Updated last year
Alternatives and similar repositories for RTB-CTF-Framework
Users that are interested in RTB-CTF-Framework are comparing it to the libraries listed below
Sorting:
- A neat CTFd Dark Theme☆19Feb 1, 2019Updated 7 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Curation of algorithms, solutions to programming problems☆10Oct 2, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- ALLES! CTF 2020 Challenges☆10Sep 21, 2020Updated 5 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- ☆11Oct 7, 2022Updated 3 years ago
- A Forum built with Python, Flask, Flask Blueprints, Flask-SQLAlchemy, and Postgresql.☆10May 1, 2023Updated 2 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 5 years ago
- This is an example of a Django application implementing a form splitted through multiple screens☆10Jun 10, 2021Updated 4 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- An AdBlocker for TV☆14Dec 24, 2020Updated 5 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Jun 5, 2021Updated 4 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- research tool for the analysis of malicious pdf documents. make sure to run the installer first to get all of the 3rd party dlls installe…☆17Sep 18, 2013Updated 12 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Conference-Notify is an open source web based application that will aggregate conference information and allow users to search and create…☆11Jan 5, 2023Updated 3 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆250Apr 27, 2020Updated 5 years ago
- Personal Blog built with Hugo☆15Jan 20, 2026Updated 3 weeks ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 6 years ago
- ☆24May 21, 2025Updated 8 months ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Sep 18, 2021Updated 4 years ago
- This tool was build to build a habit of writing better commit messages, create queryable branch, prevent committing to main branch. It is…☆10Apr 20, 2024Updated last year
- Code and notes for the 2021 HackTheBox Business CTF☆37Jul 25, 2021Updated 4 years ago
- PP Suku is a Portfolio Generator with a Frontend in React. With a GraphQL API☆17Jan 4, 2023Updated 3 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Feb 15, 2021Updated 5 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- ☆16Jun 7, 2020Updated 5 years ago
- ☆36Jun 15, 2021Updated 4 years ago
- Some cool CSS I've come across☆51Aug 9, 2023Updated 2 years ago