cmaixen / CTF-ToolsView external linksLinks
My Personal Library for CTF's
☆12Apr 3, 2018Updated 7 years ago
Alternatives and similar repositories for CTF-Tools
Users that are interested in CTF-Tools are comparing it to the libraries listed below
Sorting:
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- ☆22Jul 28, 2019Updated 6 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- ctf101 systems security repository☆26Jul 19, 2021Updated 4 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- Smoking Linux Every Day!☆56Jul 18, 2020Updated 5 years ago
- ☆27Mar 1, 2017Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Apr 10, 2022Updated 3 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Enumerate your Kubernetes cluster with just 1 command☆11Jan 31, 2026Updated last week
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62May 8, 2017Updated 8 years ago
- Rust bindings to aubio☆11Apr 13, 2020Updated 5 years ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Feb 8, 2018Updated 8 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A script to create, mount and umount LUKS encrypted disk image files.☆17Jun 24, 2024Updated last year
- Admin Panel Finder☆38Sep 22, 2025Updated 4 months ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- bunch of usefull tutorials by me☆12Nov 28, 2017Updated 8 years ago
- An experimental python library to compile and analyze the cost of any desired composite simulation in real or imaginary time, and with or…☆10Feb 9, 2024Updated 2 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- In this example, I highlight R functions and system commands that could be used to engineer efficient data science workflows.☆10Nov 9, 2018Updated 7 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- R dashboard as a designer☆10Oct 29, 2015Updated 10 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆102May 1, 2022Updated 3 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- An automated grid/ping-pong market-making bot for various exchanges.☆10Nov 2, 2018Updated 7 years ago
- Curated list of useful links for ProfitTrailer☆15Feb 16, 2018Updated 7 years ago
- A maven archetype for starting Java projects☆10Mar 20, 2025Updated 10 months ago
- Command-line based ext2/ext3/ext4 partitions/file reader for Windows.☆10Mar 1, 2018Updated 7 years ago
- ☆12Jan 11, 2026Updated last month