danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- scripts for pentesting☆88Updated 6 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 5 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- Scripts for Deploying new server☆48Updated 3 months ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- ☆52Updated 4 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 6 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆95Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- ☆26Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago