A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
☆91Apr 17, 2026Updated this week
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Oct 18, 2024Updated last year
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Apr 13, 2026Updated last week
- CLI & library to search for default credentials among thousands of Products / Vendors☆71Jul 22, 2021Updated 4 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Hash type identifier (CLI & lib)☆964Updated this week
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Apr 1, 2026Updated 2 weeks ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- Write-Ups for TryHackMe☆24May 15, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- A support library for Ronin. Like activesupport, but for hacking!☆28Jan 15, 2026Updated 3 months ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- ☆54Mar 13, 2026Updated last month
- Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.☆219Aug 26, 2024Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Apr 11, 2026Updated last week
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆23Mar 8, 2026Updated last month
- 📙 User documentation for Caido☆40Apr 8, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆24Jan 13, 2022Updated 4 years ago
- ☆46Feb 6, 2025Updated last year
- An Ansible role to install cobalt-strike☆15Aug 24, 2020Updated 5 years ago
- Serve assets in zipfiles inside or outside of Redbean☆17Sep 1, 2022Updated 3 years ago
- Repository of CVE found by OCD people☆84Jun 19, 2025Updated 10 months ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- The MSAK is a tool written in Python to help discovering and testing exposed standard and custom services of ModBus Servers/Slaves over S…☆20Mar 6, 2024Updated 2 years ago
- Encode, Decode and Crack encoded data, useful to crack some random encoded strings in CTFs.☆20Jun 25, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆39Oct 2, 2023Updated 2 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago