List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general
☆20Jan 19, 2022Updated 4 years ago
Alternatives and similar repositories for how2hack
Users that are interested in how2hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and flexible challenge downloader for all major CTF platforms☆14Oct 20, 2025Updated 5 months ago
- Public JSON feed for job ads☆16Jan 21, 2025Updated last year
- Retningslinjer for åpen kildekode i NRK☆11Mar 6, 2025Updated last year
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- ☆45Jan 6, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Intro to web development using spring boot with Java☆17Apr 21, 2022Updated 3 years ago
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆16Apr 3, 2026Updated last week
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last month
- ☆19Jan 12, 2024Updated 2 years ago
- Centralised event loop spinning☆20Aug 26, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Implementation of the paper "Hallucination Detection in LLMs Using Spectral Features of Attention Maps"☆13Oct 18, 2025Updated 5 months ago
- Poor mans Splunk. Command line real time statistics while tailing logs☆32Dec 29, 2025Updated 3 months ago
- A Python tool to manage GitHub Organizations and perform backup☆21Mar 26, 2026Updated 2 weeks ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- ☆15Updated this week
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆59Mar 7, 2026Updated last month
- Example hello world container showing how to use GitHub Container Registry☆15Mar 4, 2026Updated last month
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆14Dec 13, 2024Updated last year
- An exploit farm for attack/defense CTFs.☆29Feb 14, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Kiwi PN532 SPI library for Arduino☆15Feb 2, 2026Updated 2 months ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆24Jan 23, 2026Updated 2 months ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated 3 months ago
- RP2040 based iPhone (lightning) UART cable, that actually works☆20Jul 31, 2025Updated 8 months ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 4 months ago
- 🌳 Link in bio, hacker style.☆12Jan 12, 2026Updated 2 months ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated last year
- A (not so) shitty bruteforcer framework written in Python☆17Nov 14, 2024Updated last year
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Oct 13, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Example Cross Site Request Forgery (CSRF) vulnerabilities in action.☆19Feb 20, 2017Updated 9 years ago
- Vulnerability and exploit testing for a mobile game☆25Nov 8, 2024Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- Does what it says on the tin. Converts Pounds/Kilos to fucktons☆17Oct 24, 2024Updated last year
- A Chrome DevTools extension to inspect and manipulate WebAssembly memory at runtime. Read, view, and copy memory values to assist in reve…☆34May 27, 2025Updated 10 months ago
- Flutter App for Pujo Atlas☆12Oct 5, 2024Updated last year
- Hermes Proxy - HTTP Traffic Analyzer☆59Apr 3, 2026Updated last week