jagdishtripathy / ctf-helperLinks
CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity tasks. Whether you're a beginner or an experienced security professional, this tool provides essential features like decoding, JWT analysis, web exploitation, OSINT tools and many more—all in one place.
☆32Updated last month
Alternatives and similar repositories for ctf-helper
Users that are interested in ctf-helper are comparing it to the libraries listed below
Sorting:
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆386Updated this week
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆558Updated last year
- My notes while studying for the PNPT from TCM Security.☆78Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated 2 weeks ago
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified P…☆328Updated last month
- All Solutions☆151Updated last year
- Complete Roadmap for Penetration Testing☆236Updated 10 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆205Updated 2 weeks ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆55Updated 2 years ago
- ☆102Updated 2 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆77Updated 2 years ago
- CVE-2024-21413 PoC for THM Lab☆127Updated last year
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆194Updated 4 months ago
- ☆165Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆521Updated 3 weeks ago
- Shodan Dorks☆424Updated 5 months ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆109Updated 5 months ago
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF ver…☆102Updated last month
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆98Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 4 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆94Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!☆246Updated this week
- A quick bug bounty guide for beginners☆78Updated 3 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆147Updated 4 months ago
- Scripts for offensive security☆144Updated 2 months ago
- INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. T…☆48Updated 9 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆200Updated 4 months ago
- ☆426Updated 2 years ago
- Need help finding what room to do next if grinding points?☆28Updated 9 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆74Updated 4 months ago