ctf-o-matic / capture-the-flagLinks
Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabilities to exploit.
☆52Updated 4 years ago
Alternatives and similar repositories for capture-the-flag
Users that are interested in capture-the-flag are comparing it to the libraries listed below
Sorting:
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 10 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆100Updated 12 years ago
- Unofficial Kali Documentation Project☆159Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆105Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- password cracking front end☆57Updated 5 years ago
- Bash script to install Honeypot projects ona Raspbian System☆28Updated 10 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Updated 5 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- ☆63Updated 10 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 8 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago