☆12Feb 1, 2022Updated 4 years ago
Alternatives and similar repositories for Created-CTF-Challenges
Users that are interested in Created-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Basque translator's friend.☆12Nov 18, 2024Updated last year
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Fix Mac OS X time using ntpdate☆13Oct 12, 2014Updated 11 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy☆14Oct 23, 2024Updated last year
- ☆14Jul 18, 2019Updated 6 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Game from scratch - Pang (World) Arcade Clone☆12Apr 5, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆16Jul 17, 2024Updated last year
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- ☆11Oct 3, 2021Updated 4 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Oct 31, 2020Updated 5 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- Specialization of BERT architecture both for the Spanish language and the Twitter domain☆13Nov 6, 2020Updated 5 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Exploits solution for CrackLatinos challenges☆17Sep 29, 2019Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago