A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57May 1, 2022Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- Official Black Hat Arsenal Security Tools Repository☆160May 1, 2022Updated 3 years ago
- Free tools for mobile testing.☆38May 1, 2022Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆76May 1, 2022Updated 3 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- This project exists as a free (and transparent) alternative to paid services that show you what technologies are running on a given websi…☆57May 1, 2022Updated 3 years ago
- An iptables firewall configuration template.☆80May 1, 2022Updated 3 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25May 1, 2022Updated 3 years ago
- A simple script for translating IP addresses to GeoLocations☆51May 1, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48May 1, 2022Updated 3 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆29May 1, 2022Updated 3 years ago
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Apr 8, 2019Updated 6 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 4 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆27May 20, 2014Updated 11 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- My writeups of various CTFs & security challenges☆73Oct 15, 2025Updated 5 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- ☆12Jun 23, 2023Updated 2 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Nov 11, 2025Updated 4 months ago
- ios source grepper☆42May 4, 2017Updated 8 years ago
- Python Script For Packet Sniffing☆11Aug 19, 2020Updated 5 years ago