sarperavci / ctf-writeups-searchLinks
Search engine for CTF writeups with instant results.
☆152Updated 10 months ago
Alternatives and similar repositories for ctf-writeups-search
Users that are interested in ctf-writeups-search are comparing it to the libraries listed below
Sorting:
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Updated 11 months ago
- An archive of 0day.today exploits☆341Updated 6 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆211Updated 2 months ago
- Collection of all previous 1337UP CTF challenges.☆79Updated last year
- A web CTF for training developers in bug hunting and secure coding!☆100Updated last year
- A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.☆205Updated last week
- A modular framework for benchmarking LLMs and agentic strategies on security challenges across HackTheBox, TryHackMe, PortSwigger Labs, C…☆193Updated this week
- A research project to add some brrrrrr to Burp☆197Updated 11 months ago
- ☆314Updated 6 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆217Updated last month
- Burp Suite extension for testing Passkey systems.☆75Updated 10 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆342Updated last week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆224Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆259Updated 4 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 5 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 6 months ago
- FrogPost: postMessage Security Testing Tool☆107Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆171Updated last year
- Dredging up secrets from the depths of the file system☆132Updated last year
- A collection of Turbo Intruder scripts.☆68Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- ☆359Updated 7 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆151Updated 10 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- ☆195Updated 9 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆88Updated last week
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆31Updated 9 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated last year