danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆58Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- scripts for pentesting☆88Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 10 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- ☆61Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- Just a collection of pentest stuffs☆93Updated 5 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Scripts for Deploying new server☆49Updated 6 months ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 11 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- ☆51Updated 9 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with over 50+ …☆30Updated 3 weeks ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆155Updated 10 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- ☆52Updated 5 years ago
- Automated enumeration☆30Updated 4 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago