pwnthemall / pwnthemallView external linksLinks
Open source CTF platform
☆20Jan 31, 2026Updated 2 weeks ago
Alternatives and similar repositories for pwnthemall
Users that are interested in pwnthemall are comparing it to the libraries listed below
Sorting:
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- ☆10Dec 13, 2025Updated 2 months ago
- Create a USB Rubber Ducky 3.0 like device using a Raspberry PI Pico☆18Sep 20, 2023Updated 2 years ago
- A better netcat for Hackers☆32Dec 1, 2025Updated 2 months ago
- petit programme marrant☆30Oct 12, 2025Updated 4 months ago
- Nix Flake for the Zen Browser☆23Nov 28, 2024Updated last year
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last week
- General purpose attack-defense range for zero-config deployment☆43Nov 20, 2025Updated 2 months ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Jun 24, 2023Updated 2 years ago
- Baseline a Windows System against LOLBAS☆70Feb 2, 2026Updated last week
- eLearnSecurity Junior Penetration Tester (eJPT) v2 Notes☆307Oct 19, 2023Updated 2 years ago
- Virtual machines manipulation framework☆102Jul 23, 2025Updated 6 months ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆129Updated this week
- ☆100Dec 11, 2025Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆113Jan 30, 2026Updated 2 weeks ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Jun 16, 2021Updated 4 years ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆260Feb 5, 2026Updated last week
- GLPI vulnerabilities checking tool☆157Dec 4, 2025Updated 2 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆277Jan 12, 2026Updated last month
- Monitor your PingCastle scans to highlight the rule diff between two scans☆157Dec 10, 2025Updated 2 months ago
- RunPE implementation with multiple evasive techniques (2)☆269Sep 25, 2025Updated 4 months ago
- Offline Cybersecurity Knowledge Base☆200Updated this week
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆145Apr 2, 2024Updated last year
- Evil Crow Cable Wind device☆229Sep 3, 2025Updated 5 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆239Updated this week
- ☆176Apr 9, 2025Updated 10 months ago
- Live validation proxy tool for testing web app vulnerabilities☆823Updated this week
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 6 years ago
- Information Gatherer & Webapps Exploiter☆210Sep 3, 2024Updated last year
- Command line tool for dumping Jenkins credentials.☆200Aug 17, 2024Updated last year
- Execute commands interactively on remote Windows machines using the WinRM protocol☆326Jan 24, 2026Updated 3 weeks ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆328Jan 14, 2026Updated last month
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,012Feb 1, 2026Updated 2 weeks ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆320Feb 9, 2026Updated last week
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆507Dec 20, 2025Updated last month
- ☆327May 13, 2022Updated 3 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆333Sep 13, 2021Updated 4 years ago
- Tool and framework for securely reading untrusted USB mass storage devices.☆365Updated this week
- Mifare 1k/4k dumps parser in human readable format☆344Oct 15, 2024Updated last year