jagdishtripathy / ctf-helperLinks
CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity tasks. Whether you're a beginner or an experienced security professional, this tool provides essential features like decoding, JWT analysis, web exploitation, OSINT tools and many more—all in one place.
☆34Updated 3 months ago
Alternatives and similar repositories for ctf-helper
Users that are interested in ctf-helper are comparing it to the libraries listed below
Sorting:
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆153Updated last month
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 8 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆95Updated 9 months ago
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆577Updated 2 weeks ago
- ☆140Updated 6 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆55Updated 8 months ago
- Lists various tools used in hardware hacking.☆28Updated 8 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆309Updated 2 months ago
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆321Updated 4 months ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆308Updated this week
- Complete Roadmap for Penetration Testing☆255Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆164Updated 9 months ago
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆100Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆256Updated last year
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆67Updated 3 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- Shodan Dorks☆469Updated 10 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆78Updated 2 years ago
- An insane list of all dorks taken from everywhere from various different sources.☆750Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆224Updated 4 months ago
- A tool for automatically change the Tor IP address over time.☆122Updated 8 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆695Updated last month
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 10 months ago
- A web based OSINT ressource and tool☆185Updated 8 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 8 months ago
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆290Updated 2 years ago
- POC | Steal user WhatsApp information/data☆74Updated 7 months ago
- All Solutions☆184Updated last year