danielmiessler / CTFSolutionTypes
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
☆57Updated 3 years ago
Alternatives and similar repositories for CTFSolutionTypes:
Users that are interested in CTFSolutionTypes are comparing it to the libraries listed below
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 10 years ago
- ☆52Updated 4 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- ☆26Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- scripts for pentesting☆87Updated 6 years ago
- OSCP Scripts☆14Updated 9 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 11 months ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Query Shodan and Censys data for fast parsing☆38Updated 6 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- ☆19Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago