danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 5 years ago
- scripts for pentesting☆89Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 10 years ago
- Reconnaissance scripts for penetration testing☆57Updated 10 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆155Updated 10 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 9 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- ☆61Updated 7 years ago
- Scripts for Deploying new server☆49Updated 4 months ago
- Linux setup tool for Kali Linux☆79Updated 7 years ago
- ☆51Updated 9 years ago