A set of security related tools
☆685Mar 8, 2021Updated 4 years ago
Alternatives and similar repositories for sec-tools
Users that are interested in sec-tools are comparing it to the libraries listed below
Sorting:
- Some setup scripts for security research tools.☆9,311Updated this week
- detect stegano-hidden data in PNG & BMP☆1,539Jan 28, 2026Updated last month
- Collection of steganography tools - helps with CTF challenges☆2,640Nov 27, 2022Updated 3 years ago
- Steganography brute-force utility to uncover hidden data inside files☆591Dec 25, 2020Updated 5 years ago
- CTF framework and exploit development library☆13,293Updated this week
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,800Feb 23, 2026Updated last week
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Yet another Stego Tool☆401Jul 3, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,291Jul 22, 2024Updated last year
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,883May 6, 2023Updated 2 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A tool to analyze multi-byte xor cipher☆1,477May 21, 2025Updated 9 months ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,117Dec 2, 2021Updated 4 years ago
- CTF write-ups from the VulnHub CTF Team☆718Apr 2, 2018Updated 7 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,239Oct 10, 2023Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- A web-based, accessible and open-source port of StegSolve.☆372Jan 20, 2026Updated last month
- ☆35Aug 29, 2012Updated 13 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Writeup for the challenges in NahamCon CTF 2020☆80Aug 3, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,107Jul 29, 2024Updated last year
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,156Updated this week
- CTFs as you need them☆6,545Updated this week
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,038Feb 15, 2026Updated 2 weeks ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,377Dec 16, 2025Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,212Updated this week
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,128Jun 14, 2023Updated 2 years ago
- Ctf solutions from p4 team☆1,836Sep 18, 2024Updated last year
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆434May 20, 2023Updated 2 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆646Oct 10, 2025Updated 4 months ago