Open source CTF platform
☆22Mar 30, 2026Updated last week
Alternatives and similar repositories for pwnthemall
Users that are interested in pwnthemall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- ☆10Mar 26, 2026Updated 2 weeks ago
- A better netcat for Hackers☆33Mar 31, 2026Updated last week
- Ravage Framework - Powershell weaponized for offensive security professionals.☆77Feb 27, 2026Updated last month
- Create a USB Rubber Ducky 3.0 like device using a Raspberry PI Pico☆17Sep 20, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- petit programme marrant☆30Updated this week
- Nix Flake for the Zen Browser☆22Nov 28, 2024Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆37Mar 24, 2026Updated 2 weeks ago
- General purpose attack-defense range for zero-config deployment☆45Nov 20, 2025Updated 4 months ago
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated 2 months ago
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated 2 months ago
- Virtual machines manipulation framework☆104Mar 17, 2026Updated 3 weeks ago
- A simple and leightweight Discord Bot, that integrates with your Jellyfin Media server and enables you to listen to your favourite music …☆148Updated this week
- ☆106Feb 24, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Evasion kit for Cobalt Strike☆411Apr 3, 2026Updated last week
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆135Feb 17, 2026Updated last month
- eLearnSecurity Junior Penetration Tester (eJPT) v2 Notes☆331Oct 19, 2023Updated 2 years ago
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated 2 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆279Feb 5, 2026Updated 2 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆158Feb 19, 2026Updated last month
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆87Jun 16, 2021Updated 4 years ago
- RunPE implementation with multiple evasive techniques (2)☆278Sep 25, 2025Updated 6 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆289Mar 29, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated 2 years ago
- A visual methodology tracking platform tailored for offensive security assessments☆247Feb 10, 2026Updated 2 months ago
- Live validation proxy tool for testing web app vulnerabilities☆844Mar 24, 2026Updated 2 weeks ago
- GLPI vulnerabilities checking tool☆164Mar 30, 2026Updated last week
- ☆257Jul 31, 2024Updated last year
- ☆326May 13, 2022Updated 3 years ago
- ☆177Apr 9, 2025Updated last year
- Offline Cybersecurity Knowledge Base☆205Mar 24, 2026Updated 2 weeks ago
- Command line tool for dumping Jenkins credentials.☆201Aug 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Information Gatherer & Webapps Exploiter☆216Sep 3, 2024Updated last year
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆352Mar 19, 2026Updated 3 weeks ago
- Execute commands interactively on remote Windows machines using the WinRM protocol (just faster)☆344Mar 21, 2026Updated 2 weeks ago
- Evil Crow Cable Wind device☆242Sep 3, 2025Updated 7 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,026Feb 1, 2026Updated 2 months ago
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 6 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆378Jun 13, 2023Updated 2 years ago