A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57May 1, 2022Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆103May 1, 2022Updated 3 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆160May 1, 2022Updated 3 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆43May 1, 2022Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆75May 1, 2022Updated 3 years ago
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- This project exists as a free (and transparent) alternative to paid services that show you what technologies are running on a given websi…☆57May 1, 2022Updated 3 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25May 1, 2022Updated 3 years ago
- A simple script for translating IP addresses to GeoLocations☆51May 1, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48May 1, 2022Updated 3 years ago
- ☆34May 1, 2022Updated 3 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- A More or less Random Collection of Scripts for security Testing.☆64May 30, 2022Updated 3 years ago
- My tmux stuff☆34May 1, 2022Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- Chrome Extension for XSS Hunter Payloads☆42Sep 7, 2016Updated 9 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆29May 1, 2022Updated 3 years ago
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- ☆20Feb 1, 2026Updated last month
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- Usefull stuff from around teh internetz☆115Oct 30, 2017Updated 8 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 4 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- ☆38Jun 19, 2021Updated 4 years ago
- PwnWiki - The notes section of the pentesters mind.☆27May 20, 2014Updated 11 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago