📡 Ease file sharing during pentest/CTF 🎸
☆11Apr 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for gitar
Users that are interested in gitar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kiddy - (linux) kernel identity spoofer☆16Mar 18, 2024Updated 2 years ago
- ☆18Apr 21, 2026Updated 2 weeks ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Burp extention to automatically generate OpenAPI Json for Swagger from proxy traffic☆23Aug 3, 2022Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- 收藏webshell☆25Mar 14, 2022Updated 4 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- is-pwned — Utility to safely check the HaveIBeenPwned "Pwned Passwords" database in the browser.☆14Jul 19, 2023Updated 2 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- A tool to easily archive CTFd sites to GitHub Pages☆46Feb 3, 2026Updated 3 months ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 5 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux Remote Process Injection and Hooking Example - htop☆12Apr 30, 2021Updated 5 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆25Oct 29, 2019Updated 6 years ago
- Notion as an HTTP proxy☆37Mar 7, 2023Updated 3 years ago
- An open-source self-hosted purple team management web application.☆27Dec 10, 2025Updated 4 months ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Cross-machine AI agent communication, plus a mobile app to control any terminal on your machine.☆97Updated this week
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆32Nov 3, 2023Updated 2 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- ☆12Nov 15, 2021Updated 4 years ago
- Execute shell commands from your local browser via websockets (terrible idea, only for demos)☆13Jan 17, 2026Updated 3 months ago
- A statically typed version of pest.☆12Dec 2, 2025Updated 5 months ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Rebane's CTF tools☆13Mar 23, 2026Updated last month
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Oct 17, 2021Updated 4 years ago
- ☆11Dec 31, 2023Updated 2 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆210Jul 2, 2024Updated last year
- Simple music player for iOS using industry standard development practises☆10Jul 18, 2025Updated 9 months ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Nov 21, 2018Updated 7 years ago