intigriti / CTFLinks
Collection of all previous 1337UP CTF challenges.
☆74Updated 7 months ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- A collection of Turbo Intruder scripts.☆63Updated 6 months ago
- The Arcanum Prompt Injection Taxonomy☆131Updated 2 months ago
- Search engine for CTF writeups with instant results.☆146Updated 5 months ago
- A research project to add some brrrrrr to Burp☆183Updated 5 months ago
- Burp Suite extension for testing Passkey systems.☆73Updated 4 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆189Updated 11 months ago
- FrogPost: postMessage Security Testing Tool☆92Updated 2 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆132Updated 4 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆203Updated last month
- AI for Ethical Hacking - Workshop☆142Updated last month
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆231Updated 6 months ago
- A web CTF for training developers in bug hunting and secure coding!☆99Updated 6 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆77Updated 6 months ago
- ☆187Updated 3 months ago
- Dredging up secrets from the depths of the file system☆129Updated 9 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 2 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆351Updated 2 weeks ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆244Updated 3 months ago
- Search for sensitive data in Postman public library.☆209Updated 2 weeks ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last month
- Search for all leaked keys/secrets using one regex! bugbounty☆134Updated 4 months ago
- Websec interview questions by tib3rius answered☆309Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 3 weeks ago
- An archive of 0day.today exploits☆62Updated 2 weeks ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆151Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated last week
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆48Updated 2 weeks ago