☆11Mar 7, 2021Updated 4 years ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- This has all of my resources advised in my youtube channel for the TMUA exam☆20Jan 7, 2025Updated last year
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆54Feb 10, 2026Updated 2 weeks ago
- A page with resources, and problem editorials, relating to Cyprus Olympiad in Informatics☆10Feb 16, 2026Updated last week
- ☆11Oct 31, 2023Updated 2 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Using fingerprint features to detect blood groups☆11Aug 14, 2023Updated 2 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourc…☆16May 31, 2025Updated 9 months ago
- Agent Development Kit (ADK)☆23Sep 24, 2025Updated 5 months ago
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 10 months ago
- Matrix MLM platform built with laravel☆12May 16, 2019Updated 6 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- ☆10Feb 1, 2022Updated 4 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- use github as a cdn☆13Nov 17, 2025Updated 3 months ago
- ☆12Mar 24, 2018Updated 7 years ago
- Automated Wallpaper Management for Wayland Using Swaybg☆14Jan 5, 2026Updated last month
- ☆10Jan 8, 2023Updated 3 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- JavaScript component to parse, clean, remove formatting (unformat) numbers in strings.☆10Dec 5, 2024Updated last year
- ☆11Oct 21, 2020Updated 5 years ago
- Try harder to bypass that WAF...☆13Jan 4, 2015Updated 11 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Get GTFOBins info about a given exploit from the command line☆39Aug 4, 2024Updated last year
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆12Feb 20, 2025Updated last year
- Bot Auto Checkout Flashsale Shopee Promo versi 2. Feature : Auto Login. Auto Checkout. Bahan untuk di Pc : Net framework 4.8 : https:/…☆17Dec 11, 2020Updated 5 years ago
- ☆11Dec 27, 2023Updated 2 years ago
- Bibata Cursor, with support for hyprcursor and Xcursor☆19Jan 28, 2025Updated last year
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- AdAway Automation☆19Aug 8, 2021Updated 4 years ago
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 2 months ago
- ☆44Oct 21, 2025Updated 4 months ago
- 🌍 My website☆10Nov 23, 2025Updated 3 months ago