CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity tasks. Whether you're a beginner or an experienced security professional, this tool provides essential features like decoding, JWT analysis, web exploitation, OSINT tools and many more—all in one place.
☆34Mar 8, 2026Updated 2 months ago
Alternatives and similar repositories for ctf-helper
Users that are interested in ctf-helper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- An advanced XSS vulnerability scanner.☆11Feb 24, 2025Updated last year
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 8 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆25Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆71Jan 25, 2026Updated 3 months ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 9 months ago
- ☆10Mar 11, 2024Updated 2 years ago
- 🚀 Script Auto Quest " Permissões Linux " no Ubuntu.☆26May 31, 2025Updated 11 months ago
- ☆14Oct 14, 2022Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆42Jan 26, 2026Updated 3 months ago
- A music player for your terminal☆15Mar 18, 2026Updated last month
- Comunidade Brasileira de Cibersegurança☆25Oct 6, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 11 months ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆18Dec 26, 2025Updated 4 months ago
- SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.…☆29Feb 12, 2024Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 10 months ago
- ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F☆151Feb 20, 2026Updated 2 months ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆37Sep 14, 2025Updated 7 months ago
- keep watching new bug bounty (vulnerability) postings.☆12Apr 7, 2024Updated 2 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 4 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Django middleware and signals for handling security events☆14Apr 14, 2021Updated 5 years ago
- My notes while studying for the PNPT from TCM Security.☆82Mar 30, 2024Updated 2 years ago
- setup wazuh to serve multiple organizations on a single instance.☆12Dec 29, 2023Updated 2 years ago
- Backdoor Visual Studio project files with custom shellcode, which executes whenever the project is opened or built.☆36Updated this week
- ☆12Jan 21, 2019Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆23Aug 6, 2023Updated 2 years ago
- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links th…☆54Jan 6, 2025Updated last year
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆22Apr 14, 2026Updated 3 weeks ago
- ☆12Jun 8, 2018Updated 7 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 3 years ago
- Control Claude Code remotely from your iPhone anywhere☆30Jul 21, 2025Updated 9 months ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 10 months ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago