A set of security related tools
☆686Mar 8, 2021Updated 5 years ago
Alternatives and similar repositories for sec-tools
Users that are interested in sec-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some setup scripts for security research tools.☆9,333Mar 1, 2026Updated 3 weeks ago
- detect stegano-hidden data in PNG & BMP☆1,547Jan 28, 2026Updated last month
- Collection of steganography tools - helps with CTF challenges☆2,644Nov 27, 2022Updated 3 years ago
- Steganography brute-force utility to uncover hidden data inside files☆592Dec 25, 2020Updated 5 years ago
- Yet another Stego Tool☆402Jul 3, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTF framework and exploit development library☆13,328Updated this week
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,896May 6, 2023Updated 2 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,838Mar 2, 2026Updated 3 weeks ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,378Jul 22, 2024Updated last year
- Repository to deploy CTFd using docker.☆41Nov 15, 2020Updated 5 years ago
- A tool to analyze multi-byte xor cipher☆1,477May 21, 2025Updated 10 months ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,252Oct 10, 2023Updated 2 years ago
- A neat CTFd Dark Theme☆19Feb 1, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,823Jun 8, 2019Updated 6 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,121Dec 2, 2021Updated 4 years ago
- Writeup for the challenges in NahamCon CTF 2020☆81Aug 3, 2020Updated 5 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- CTF write-ups from the VulnHub CTF Team☆718Apr 2, 2018Updated 7 years ago
- A repository for learning various heap exploitation techniques.☆8,530Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,663Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PEDA - Python Exploit Development Assistance for GDB☆6,110Jul 29, 2024Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆436May 20, 2023Updated 2 years ago
- A web-based, accessible and open-source port of StegSolve.☆375Mar 4, 2026Updated 3 weeks ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,058Mar 18, 2026Updated last week
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆647Oct 10, 2025Updated 5 months ago
- ☆35Aug 29, 2012Updated 13 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,230Updated this week
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Jul 9, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated last week
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- ☆720Feb 20, 2024Updated 2 years ago
- Writeups from CTFs I've done in the past☆24Nov 15, 2016Updated 9 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- Ctf solutions from p4 team☆1,837Sep 18, 2024Updated last year
- Writeups of Capture The Flag Competitions☆123Jul 13, 2022Updated 3 years ago