danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- scripts for pentesting☆88Updated 6 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 5 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 4 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Scripts for Deploying new server☆48Updated 2 months ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Hacking challenges☆31Updated 7 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Automated enumeration☆30Updated 4 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆94Updated 3 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago