danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- scripts for pentesting☆86Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Reconnaissance scripts for penetration testing☆59Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- ☆53Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- ☆61Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Scripts for Deploying new server☆49Updated 9 months ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Updated 10 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago