CTF enumeration tool. It facilitates the Network Pentest
☆40Jan 4, 2026Updated 3 months ago
Alternatives and similar repositories for CTFEnum
Users that are interested in CTFEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆29Apr 15, 2025Updated last year
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 2 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆111Jan 30, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Build Alpine Linux images for LXD☆204Jul 10, 2025Updated 9 months ago
- an informative progress bar for Python 2+3 command-line tools☆12Nov 18, 2019Updated 6 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated last month
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr☆17Mar 23, 2022Updated 4 years ago
- Mazesec团队自制靶机题解仓库,专注于分享HackMyVM平台的自制靶机PDF题解,涵盖渗透测试实战与安全研究,供学习交流使用。☆71Apr 6, 2026Updated last week
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- purplestorm writeup collection☆31Apr 4, 2026Updated last week
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 5 years ago
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- A tool for mapping cypher databases☆16Jan 20, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- A Python-based automation tool for interacting with the Burp Suite API to run scans and retrieve vulnerability data programmatically.☆10Oct 3, 2022Updated 3 years ago
- Various notes I have compiled during the OSEP PEN-300 course.☆43Mar 16, 2025Updated last year
- Chinese mirror of Tryhackme tutorials☆16Dec 11, 2025Updated 4 months ago
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆27Sep 6, 2025Updated 7 months ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆58Jan 29, 2023Updated 3 years ago
- CMS Made Simple☆19Mar 23, 2026Updated 3 weeks ago
- brute-forcing su for fun and possibly profit☆100May 22, 2019Updated 6 years ago
- 目前通过自学已经取得 OSCP(Offensive Security Certified Professional)证书,本项目用于记录、分享、交流。☆11Aug 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆1,014Jan 23, 2023Updated 3 years ago
- Weaponized VSCode Extensions☆15Feb 22, 2026Updated last month
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆25May 1, 2024Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 3 years ago
- A collection of config files for linux focusing on hackthebox theme☆53Apr 4, 2026Updated last week
- Repository for tools used for the OSCP☆24Sep 18, 2025Updated 6 months ago