CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity tasks. Whether you're a beginner or an experienced security professional, this tool provides essential features like decoding, JWT analysis, web exploitation, OSINT tools and many more—all in one place.
☆34Mar 8, 2026Updated 3 weeks ago
Alternatives and similar repositories for ctf-helper
Users that are interested in ctf-helper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 7 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆67Jan 25, 2026Updated 2 months ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆21Jul 13, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆10Mar 11, 2024Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- Comunidade Brasileira de Cibersegurança☆23Oct 6, 2025Updated 5 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- PowerShell wrapper for the SentinelOne API☆10Jan 4, 2025Updated last year
- ☆49Nov 25, 2025Updated 4 months ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 3 months ago
- The repo contains publicly available malware analysis and reversing resources.☆12Oct 13, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.…☆28Feb 12, 2024Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 8 months ago
- ☆16May 21, 2019Updated 6 years ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆36Sep 14, 2025Updated 6 months ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated last year
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- My notes while studying for the PNPT from TCM Security.☆81Mar 30, 2024Updated last year
- setup wazuh to serve multiple organizations on a single instance.☆11Dec 29, 2023Updated 2 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 9 months ago
- ☆26Sep 1, 2022Updated 3 years ago
- ☆22Sep 20, 2025Updated 6 months ago
- ☆12Jun 8, 2018Updated 7 years ago
- Python script to create an .stl mesh from .gcode☆25Feb 14, 2024Updated 2 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- ☆18Oct 20, 2021Updated 4 years ago
- ☆13Oct 12, 2022Updated 3 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Offensive Powershell obfuscator☆27Sep 6, 2024Updated last year
- My learning guide for preparation of the CISSP exam☆13Apr 8, 2015Updated 10 years ago