Open source CTF platform
☆22Mar 5, 2026Updated 2 weeks ago
Alternatives and similar repositories for pwnthemall
Users that are interested in pwnthemall are comparing it to the libraries listed below
Sorting:
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- ☆10Feb 21, 2026Updated last month
- A better netcat for Hackers☆33Dec 1, 2025Updated 3 months ago
- Ravage Framework - Powershell weaponized for offensive security professionals.☆75Feb 27, 2026Updated 3 weeks ago
- Create a USB Rubber Ducky 3.0 like device using a Raspberry PI Pico☆17Sep 20, 2023Updated 2 years ago
- Nix Flake for the Zen Browser☆23Nov 28, 2024Updated last year
- petit programme marrant☆30Oct 12, 2025Updated 5 months ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Jun 24, 2023Updated 2 years ago
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 4 months ago
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last month
- Baseline a Windows System against LOLBAS☆72Feb 2, 2026Updated last month
- Virtual machines manipulation framework☆104Updated this week
- A simple and leightweight Discord Bot, that integrates with your Jellyfin Media server and enables you to listen to your favourite music …☆146Mar 4, 2026Updated 2 weeks ago
- ☆104Feb 24, 2026Updated 3 weeks ago
- Evasion kit for Cobalt Strike☆395Mar 5, 2026Updated 2 weeks ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆135Feb 17, 2026Updated last month
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated last month
- eLearnSecurity Junior Penetration Tester (eJPT) v2 Notes☆329Oct 19, 2023Updated 2 years ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆276Feb 5, 2026Updated last month
- Monitor your PingCastle scans to highlight the rule diff between two scans☆158Feb 19, 2026Updated last month
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆87Jun 16, 2021Updated 4 years ago
- RunPE implementation with multiple evasive techniques (2)☆277Sep 25, 2025Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆288Jan 12, 2026Updated 2 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated last year
- A visual methodology tracking platform tailored for offensive security assessments☆242Feb 10, 2026Updated last month
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated last month
- GLPI vulnerabilities checking tool☆161Mar 10, 2026Updated last week
- ☆327May 13, 2022Updated 3 years ago
- ☆176Apr 9, 2025Updated 11 months ago
- Information Gatherer & Webapps Exploiter☆212Sep 3, 2024Updated last year
- Command line tool for dumping Jenkins credentials.☆200Aug 17, 2024Updated last year
- Offline Cybersecurity Knowledge Base☆203Mar 2, 2026Updated 2 weeks ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆335Mar 11, 2026Updated last week
- Execute commands interactively on remote Windows machines using the WinRM protocol☆342Jan 24, 2026Updated last month
- Evil Crow Cable Wind device☆237Sep 3, 2025Updated 6 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,022Feb 1, 2026Updated last month
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 6 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆379Jun 13, 2023Updated 2 years ago
- Tool and framework for securely reading untrusted USB mass storage devices.☆369Mar 13, 2026Updated last week