☆11Mar 7, 2021Updated 5 years ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 2 months ago
- This repository contains NLU related material for the I833 Deep Learning course at University of Applied Sciences Dresden☆13Dec 16, 2024Updated last year
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Agent Development Kit (ADK)☆23Sep 24, 2025Updated 5 months ago
- ☆10Jan 8, 2023Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Using fingerprint features to detect blood groups☆11Aug 14, 2023Updated 2 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- Infosec resource center for offensive and defensive security operations.☆14Apr 3, 2024Updated last year
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Bot Auto Checkout Flashsale Shopee Promo versi 2. Feature : Auto Login. Auto Checkout. Bahan untuk di Pc : Net framework 4.8 : https:/…☆17Dec 11, 2020Updated 5 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 7 months ago
- Proof of Concepts of vulnerabilities discovered by me☆11Jan 24, 2024Updated 2 years ago
- ☆11Dec 27, 2023Updated 2 years ago
- Create your own powershell, malware desktop app or even clickjacking web with a single command for unix and windows systems.☆17May 26, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- SDK for pairing and interacting with Mi Band 2 via .NET and UWP.☆12Jun 3, 2019Updated 6 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- JavaScript component to parse, clean, remove formatting (unformat) numbers in strings.☆10Dec 5, 2024Updated last year
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- AI personal assistant written in Python. Voice Assistant with Real-Time Speech Recognition and Response on a local computer.☆27Sep 29, 2025Updated 5 months ago
- ☆10Nov 27, 2020Updated 5 years ago
- A simple website to show you the nearest reported case of COVID-19.☆15Jan 7, 2023Updated 3 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Jan 18, 2026Updated 2 months ago
- ☆22Mar 5, 2018Updated 8 years ago
- ☆11Oct 27, 2021Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- Download links from Google Drive, from apps published on macbed☆23Sep 3, 2017Updated 8 years ago
- Complete flutter app for beginners. Using flutter, firebase and provider state management.☆22Mar 12, 2025Updated last year