CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity tasks. Whether you're a beginner or an experienced security professional, this tool provides essential features like decoding, JWT analysis, web exploitation, OSINT tools and many more—all in one place.
☆34Mar 8, 2026Updated last month
Alternatives and similar repositories for ctf-helper
Users that are interested in ctf-helper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆20Jul 31, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 7 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆70Jan 25, 2026Updated 2 months ago
- ☆10Mar 11, 2024Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- 🚀 Script Auto Quest " Permissões Linux " no Ubuntu.☆26May 31, 2025Updated 10 months ago
- ☆14Oct 14, 2022Updated 3 years ago
- Comunidade Brasileira de Cibersegurança☆24Oct 6, 2025Updated 6 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆16Dec 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A music player for your terminal☆15Mar 18, 2026Updated last month
- PowerShell wrapper for the SentinelOne API☆10Jan 4, 2025Updated last year
- ☆49Nov 25, 2025Updated 4 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 10 months ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 3 months ago
- SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.…☆29Feb 12, 2024Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 9 months ago
- ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F☆149Feb 20, 2026Updated last month
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆36Sep 14, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The repo contains publicly available malware analysis and reversing resources.☆14Oct 13, 2025Updated 6 months ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated 2 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- My notes while studying for the PNPT from TCM Security.☆83Mar 30, 2024Updated 2 years ago
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- 🔥AI-Terminal-X is an AI-powered Linux terminal assistant🔥 that converts natural language commands into executable terminal commands usi…☆37Dec 24, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links th…☆47Jan 6, 2025Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 9 months ago
- ☆22Updated this week
- ☆12Jun 8, 2018Updated 7 years ago
- Python script to create an .stl mesh from .gcode☆25Feb 14, 2024Updated 2 years ago