Capture The Flag Information
☆12Dec 7, 2018Updated 7 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- module that resolves and cleans up urls☆22Jul 20, 2021Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- API for parsing binary files using a predefined grammar☆15Nov 17, 2016Updated 9 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆22Jan 2, 2024Updated 2 years ago
- ☆10Feb 23, 2026Updated last week
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Identifies music based on microphone input. By request of someone in r/learnprogramming.☆19Dec 8, 2012Updated 13 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- Dead simple JSON Formatter☆10Oct 21, 2016Updated 9 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last week
- A collection of advent of code solutions.☆10Dec 28, 2015Updated 10 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆98Feb 21, 2019Updated 7 years ago
- Monitor your domains for newly issued certificates and alert to Slack in near-realtime☆10Aug 29, 2022Updated 3 years ago
- Scans a given directory tree for interesting assembly references☆17Updated this week
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Chrome Extensions Dataset☆10Updated this week
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- TONBI is a source code auditing scanner against framework based web application. It hunts for various vulnerabilites in such as Laravel, …☆10Jan 25, 2022Updated 4 years ago
- Clock is a small library for mocking time in Go.☆13Jan 12, 2025Updated last year
- ☆14Sep 24, 2012Updated 13 years ago
- ☆11Jun 5, 2022Updated 3 years ago
- ☆15Oct 20, 2011Updated 14 years ago