Front end of a Capture the Flag ( CTF ) website
☆66Oct 24, 2020Updated 5 years ago
Alternatives and similar repositories for CTF-Website-Template-2020
Users that are interested in CTF-Website-Template-2020 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- Python Pickle RCE Exploit + vulnerable Flask App☆15Aug 27, 2021Updated 4 years ago
- A full CTF Website Server & Frontend | Extremely customizable☆58Apr 24, 2024Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 5 months ago
- #xss #xssfinder #xss-scanner #bugbounty #hacktool☆38Jan 7, 2024Updated 2 years ago
- Collections of CTF-WEB-challs mainly for review purpose.☆31Jul 16, 2023Updated 2 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Feb 5, 2024Updated 2 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Custom CTFd Dark Theme☆25Aug 26, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- This repo contains the lazyFuzzer and the Report on the output from the same☆17Oct 26, 2019Updated 6 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- python camouflager, rename all your project's names (variables, function, modules, files, etc)☆10Apr 16, 2017Updated 8 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- Convert boring text to wonderful emojis☆15Feb 24, 2017Updated 9 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- Perform With Massive Wordpress Enumeration☆12Aug 18, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆19Nov 27, 2020Updated 5 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 9 months ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- Personal website, darkstar7471.com☆11Dec 16, 2021Updated 4 years ago
- ☆10Oct 3, 2019Updated 6 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- A fast, efficient and lightweight (~100 KB) Capture The Flag framework inspired by the HackTheBox platform. Built with Flask.☆110Mar 20, 2024Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Easily create and manage Capture the flag competitions☆14Jul 4, 2023Updated 2 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- A simple python script for doing brute-force attack using selenium.☆14Apr 15, 2024Updated last year
- App for generating OTP tokens for 2FA protected accounts☆21Updated this week
- r2inspect is a professional malware analysis framework that automates deep static inspection for PE, ELF, and Mach-O binaries using the r…☆49Mar 23, 2026Updated last week
- Pdf-exploit builder Non-Silent on C#☆20Aug 31, 2024Updated last year
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year