CTF enumeration tool. It facilitates the Network Pentest
☆40Jan 4, 2026Updated 4 months ago
Alternatives and similar repositories for CTFEnum
Users that are interested in CTFEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.☆52Mar 24, 2025Updated last year
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆29Apr 15, 2025Updated last year
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 3 months ago
- A comprehensive collection of free cybersecurity eBooks categorized by topics and updated regularly☆43Mar 9, 2026Updated last month
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆112Jan 30, 2026Updated 3 months ago
- an informative progress bar for Python 2+3 command-line tools☆12Nov 18, 2019Updated 6 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated 2 months ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr☆17Mar 23, 2022Updated 4 years ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆43Feb 19, 2025Updated last year
- Mazesec团队自制靶机题解仓库,专注于分享HackMyVM平台的自制靶机PDF题 解,涵盖渗透测试实战与安全研究,供学习交流使用。☆75Apr 26, 2026Updated last week
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- A little tool to play with Windows security☆145Apr 10, 2026Updated 3 weeks ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- A tool for mapping cypher databases☆16Jan 20, 2026Updated 3 months ago
- ☆24Mar 29, 2026Updated last month
- Various notes I have compiled during the OSEP PEN-300 course.☆44Mar 16, 2025Updated last year
- ☆10Updated this week
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆59Jan 29, 2023Updated 3 years ago
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆29Sep 6, 2025Updated 7 months ago
- recovers passwords and removes protection from ZIP, 7Zip and RAR archives created with all versions of PKZip, WinZip, 7Zip, RAR and WinRA…☆17Nov 8, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Privilege escalation to root using sudo chroot, NO NEED for gcc installed.☆48Oct 6, 2025Updated 6 months ago
- 目前通过自学已经取得 OSCP(Offensive Security Certified Professional)证书,本项目用于记录、分享、交流。☆11Aug 16, 2022Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- ☆1,024Jan 23, 2023Updated 3 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Offensive Security Using Python, published by Packt☆30Apr 22, 2026Updated last week
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆25May 1, 2024Updated 2 years ago