danielmiessler / CTFSolutionTypes
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆56Updated 2 years ago
Alternatives and similar repositories for CTFSolutionTypes:
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 9 years ago
- ☆26Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- ☆52Updated 4 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- OSCP Scripts☆14Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- scripts for pentesting☆87Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Automated enumeration☆30Updated 3 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- ☆61Updated 7 years ago
- ☆51Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Linux pentest tools☆87Updated 5 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- Query Shodan and Censys data for fast parsing☆38Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆26Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆64Updated 6 years ago