Collaborative programming environment inside GitHub Actions – like Google Docs for hacking
☆72Apr 28, 2023Updated 3 years ago
Alternatives and similar repositories for ctf-collab
Users that are interested in ctf-collab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Im a free fire max I'd hacker I'm hack all tipes of IDs fb and google☆34May 8, 2023Updated 2 years ago
- Display a diff between two files in HTML.☆15Nov 26, 2021Updated 4 years ago
- ☆15Mar 6, 2025Updated last year
- ☆13Mar 15, 2022Updated 4 years ago
- hack HQ trivia with OCR and google search☆17Dec 7, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The largest collection of wordlists in yaml for bug bounty tools☆37Apr 7, 2024Updated 2 years ago
- Scriptable iOS Widget to display a new random Pokémon every day☆14Mar 28, 2026Updated last month
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Google hacking☆12Apr 26, 2023Updated 3 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- Hacks for Google Chrome DevTools.☆13May 27, 2014Updated 11 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Google Hacking Database☆10Jan 11, 2019Updated 7 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Google hacking info☆19Jan 28, 2021Updated 5 years ago
- ☆62Jul 23, 2024Updated last year
- ☆21Nov 13, 2019Updated 6 years ago
- ☆12Jul 10, 2024Updated last year
- Google drive loader for yi smart ip camera (MStar based)☆14Jun 25, 2023Updated 2 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- Google's "did you mean" hack in Python☆15Mar 29, 2013Updated 13 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Dec 5, 2020Updated 5 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- My ansible playbooks repo for various silly things.☆13Jun 17, 2025Updated 10 months ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Code repo for https://benhoyt.com/writings/io-is-no-longer-the-bottleneck/☆14Nov 26, 2022Updated 3 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago