Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabilities to exploit.
☆52Feb 21, 2021Updated 5 years ago
Alternatives and similar repositories for capture-the-flag
Users that are interested in capture-the-flag are comparing it to the libraries listed below
Sorting:
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Mar 30, 2016Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- Code behind areweslimyet.com☆31Feb 14, 2018Updated 8 years ago
- php-cli vulnerability scanner☆79Jun 29, 2015Updated 10 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- TheYoke is an ultra-simple, polite feed aggregrator designed for use on the UNIX command line.☆23Feb 25, 2014Updated 12 years ago
- Hobbywing Telemetry Adapter for Flysky i.bus☆12May 9, 2025Updated 10 months ago
- This is a Cross Project for dev-Common structures, listing all final ontoliogy structures of any common good application☆14Aug 23, 2017Updated 8 years ago
- "Container" for my brainfarts☆23Dec 30, 2015Updated 10 years ago
- Adding client SOCKS support to Twisted.☆18Feb 2, 2014Updated 12 years ago
- An ESPHome component for accepting a secret PIN over Bluetooth LE.☆11Apr 7, 2024Updated last year
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- Qt implementation of I2C protocol for RaspberryPi along with some i2c sensors, in particular: TOF10120, VL53l1X, VL6180X, MPU6050, QMC588…☆15Feb 1, 2021Updated 5 years ago
- Go automated nmap scanner☆12Jun 17, 2019Updated 6 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- A tweaked version of SdFat to improve block read speed☆11Nov 23, 2015Updated 10 years ago
- Arduino Robot Cars which can be controlled using an Android App is developed using various components such as Arduino UNO, Bluetooth modu…☆12May 4, 2018Updated 7 years ago
- Plen2 humanoid robot using SG90 Servo, Raspberry Pi Zero W and Adafruit 815 16ch Controllerboard.☆10Feb 4, 2019Updated 7 years ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Write Perl subroutines in other programming languages☆19Jul 10, 2025Updated 7 months ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- Summary of all repositories for my public contents, mostly Python, in Jupyter Notebooks, PDFs, Markdowns, and more!☆11Aug 24, 2021Updated 4 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago