A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.
☆91May 12, 2026Updated last week
Alternatives and similar repositories for ctf-party
Users that are interested in ctf-party are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CLI & library to search for default credentials among thousands of Products / Vendors☆71Jul 22, 2021Updated 4 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- ☆11Oct 7, 2022Updated 3 years ago
- Hash type identifier (CLI & lib)☆984Updated this week
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28May 1, 2026Updated 2 weeks ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- Write-Ups for TryHackMe☆24May 15, 2021Updated 5 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- A support library for Ronin. Like activesupport, but for hacking!☆28Jan 15, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆38Oct 3, 2023Updated 2 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- ☆57Mar 13, 2026Updated 2 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.☆219Aug 26, 2024Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated this week
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆23Mar 8, 2026Updated 2 months ago
- 📙 User documentation for Caido☆40Updated this week
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 3 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆24Jan 13, 2022Updated 4 years ago
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- ☆46Feb 6, 2025Updated last year
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- Repository of CVE found by OCD people☆85Jun 19, 2025Updated 11 months ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆41Oct 2, 2023Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago