echobash / CTF-Resources
Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more
☆11Updated 2 years ago
Alternatives and similar repositories for CTF-Resources:
Users that are interested in CTF-Resources are comparing it to the libraries listed below
- Xss payload for bypassing waf☆14Updated 4 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated last year
- ☆15Updated last month
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated last year
- Official Android Pentesting Slide By RootBakar☆15Updated 3 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 2 years ago
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆32Updated 11 months ago
- A summary of the most abbreviations I encountered so far☆18Updated this week
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆66Updated 2 years ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆39Updated 3 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆13Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆25Updated 10 months ago
- Filter URLs to save your time.☆59Updated 2 years ago
- assets for www.hahwul.com☆21Updated this week
- ☆48Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- My personal collection of nuclei templates made for fuzzing.☆27Updated 4 months ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 4 months ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆30Updated last year
- Fast and customizable Firebase api and Project ID extractor .☆17Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 11 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆17Updated 7 months ago
- Dump paths & pages from Next.js Manifest☆13Updated 10 months ago
- Bash wrapper for multiple subdomain enumeration scripts☆9Updated 3 years ago