CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity tasks. Whether you're a beginner or an experienced security professional, this tool provides essential features like decoding, JWT analysis, web exploitation, OSINT tools and many more—all in one place.
☆34Sep 26, 2025Updated 5 months ago
Alternatives and similar repositories for ctf-helper
Users that are interested in ctf-helper are comparing it to the libraries listed below
Sorting:
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆20Mar 2, 2026Updated last week
- Automated way to extract juicy info with subfinder and waybackurls☆40Aug 24, 2025Updated 6 months ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆36Sep 14, 2025Updated 5 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.…☆28Feb 12, 2024Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 8 months ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 2 months ago
- Comunidade Brasileira de Cibersegurança☆23Oct 6, 2025Updated 5 months ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆58Apr 4, 2024Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- My notes while studying for the PNPT from TCM Security.☆81Mar 30, 2024Updated last year
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- ☆49Nov 25, 2025Updated 3 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 8 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated 2 weeks ago
- ☆75Nov 13, 2025Updated 3 months ago
- ☆23Mar 22, 2025Updated 11 months ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago
- Cryptonix is a tool for generating Bitcoin and Ethereum addresses with corresponding private keys. It scans for balances, displaying resu…☆39May 15, 2025Updated 9 months ago
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆45Mar 8, 2025Updated last year
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence servic…☆21Mar 2, 2026Updated last week
- rockyou.txt the famous wordlist for password cracking☆32Apr 7, 2025Updated 11 months ago
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆13Nov 13, 2024Updated last year
- A tool to check TCP connections.☆15Jun 20, 2025Updated 8 months ago
- ☆23Jun 28, 2025Updated 8 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- hubspot mcp server☆12Apr 1, 2025Updated 11 months ago
- Multi-threading Leaks/Intelligence file parser☆15Mar 2, 2026Updated last week
- ☆13Oct 12, 2022Updated 3 years ago