danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 5 years ago
- scripts for pentesting☆88Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago
- Linux setup tool for Kali Linux☆79Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- ☆61Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 10 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆20Updated 8 years ago
- Determine everything you need to know to about a system☆32Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆155Updated 10 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- ☆52Updated 5 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Scripts for Deploying new server☆49Updated 5 months ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with over 50+ …☆30Updated this week