danielmiessler / CTFSolutionTypesLinks
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
Sorting:
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- Reconnaissance scripts for penetration testing☆58Updated 9 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- scripts for pentesting☆88Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- ☆52Updated 4 years ago
- OSCP Scripts☆14Updated 9 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- ☆26Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Automated enumeration☆30Updated 4 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆94Updated 3 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- Web shells for use in penetration testing☆39Updated 10 years ago
- pwk notes and scripts☆15Updated 10 years ago