☆12Feb 1, 2022Updated 4 years ago
Alternatives and similar repositories for Created-CTF-Challenges
Users that are interested in Created-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Chess live interface☆12Oct 25, 2025Updated 4 months ago
- CTF write-ups repository☆42Jul 8, 2023Updated 2 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- AutoDecoder tool for CTFs☆17Nov 4, 2018Updated 7 years ago
- A search tool that can find exposed email addresses and mobile numbers on Internet.☆16May 12, 2024Updated last year
- ☆24Mar 30, 2022Updated 3 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆42Jan 13, 2026Updated 2 months ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Advisories and Proofs of Concept by BlackArrow☆19Dec 17, 2024Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- CTF-Writeups☆11Mar 3, 2021Updated 5 years ago
- Diccionaris catalans per a generar contrasenyes Diceware☆17Jan 9, 2017Updated 9 years ago
- Repository of files for independent anti-phishing campaign, trusted information and more☆10May 14, 2020Updated 5 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆16Jul 17, 2024Updated last year
- An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy☆14Oct 23, 2024Updated last year
- WhatWebGUI is a cross-platform compatible Java-based application for Windows 10, Mac OSX and Linux which implements the front end of the …☆16Mar 1, 2021Updated 5 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- jcat (jupyter cat) is a command line tool for viewing notebook(*.ipynb) files in terminal.☆10Sep 17, 2022Updated 3 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- ☆14Jul 3, 2024Updated last year
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 2 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Gather pagegraph data from all over the internet☆28Updated this week
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Example of implementing i18n support with Flask-Babel.☆15Feb 2, 2015Updated 11 years ago