CTF enumeration tool. It facilitates the Network Pentest
☆40Jan 4, 2026Updated 2 months ago
Alternatives and similar repositories for CTFEnum
Users that are interested in CTFEnum are comparing it to the libraries listed below
Sorting:
- Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.☆52Mar 24, 2025Updated 11 months ago
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆29Apr 15, 2025Updated 10 months ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Feb 15, 2026Updated 2 weeks ago
- Mazesec团队自制靶机题解仓库,专注于分享HackMyVM平台的自制靶机PDF题解,涵盖渗透测试实战与安全研究,供学习交流使用。☆55Updated this week
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- D2R MapHack☆12Jun 10, 2022Updated 3 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- ☆11Mar 12, 2020Updated 5 years ago
- Automate the setup of Damn Vulnerable Web Application (DVWA) with this Bash script. It ensures a smooth installation, adapting to the sys…☆11Oct 15, 2025Updated 4 months ago
- ☆23Jan 1, 2026Updated 2 months ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- ☆10Jan 18, 2023Updated 3 years ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- HTB write-ups with detailed walkthroughs, screenshots, and tutorials for ethical hacking, CTF challenges, and penetration testing.☆24Nov 10, 2025Updated 3 months ago
- ☆11Dec 15, 2022Updated 3 years ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- A repo of my talks☆11Nov 28, 2023Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- ☆10Feb 2, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- an informative progress bar for Python 2+3 command-line tools☆12Nov 18, 2019Updated 6 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- ☆10Mar 7, 2023Updated 2 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Picarch is a Python project for face detection and image similarity search using insightface and PostgreSQL.☆14Apr 8, 2025Updated 10 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- The agent for kube-advisor.io☆14Jan 28, 2025Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago