tcbutler320 / ctf-playbookView external linksLinks
This project is no longer maintained
☆12May 10, 2020Updated 5 years ago
Alternatives and similar repositories for ctf-playbook
Users that are interested in ctf-playbook are comparing it to the libraries listed below
Sorting:
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- SageStrike is an offensive security tool for simulating and evaluating post-exploitation scenarios in AWS SageMaker environments.☆19Aug 2, 2025Updated 6 months ago
- Identify the technologies used on websites. (Dig-deep into web tech from your terminal)☆49Jun 18, 2025Updated 7 months ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆66Oct 26, 2019Updated 6 years ago
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- A step-by-step guide to setting up and running DeepSeek locally using Ollama, making it accessible via a browser as an offline chatbot.☆10Jan 30, 2025Updated last year
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆12Jan 18, 2025Updated last year
- Tool to pentest spark clusters☆32Jun 26, 2024Updated last year
- Simple project to test Elasticsearch with Django, build on docker.☆10Aug 16, 2020Updated 5 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- 📝 My Bug Bounty Writeups☆10Nov 16, 2025Updated 3 months ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- ☆11May 28, 2020Updated 5 years ago
- Example of building a Windows Server 2016 AMI for EC2 using Packer☆12Sep 6, 2018Updated 7 years ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆45May 25, 2023Updated 2 years ago
- 🎯 Command Injection Payload List☆18Apr 19, 2021Updated 4 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- GCI project category descriptions☆41Jan 14, 2020Updated 6 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆45Jan 20, 2025Updated last year
- Microsoft give away books downloader in Linux or Windows☆13Feb 3, 2022Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 4 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- ☆13Apr 27, 2021Updated 4 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆11Nov 26, 2020Updated 5 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- WhatsApp Unofficial MCP Server☆38Jan 5, 2026Updated last month
- An Indic language transliteration editor. Master repo : https://gitlab.com/subins2000/varnam☆11Jul 22, 2023Updated 2 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- ☆10Nov 19, 2020Updated 5 years ago
- ☆11Nov 24, 2023Updated 2 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- Escaping Restricted Environments and Bypassing DLP☆77Jan 22, 2019Updated 7 years ago
- UEBA Solution for Insider Security. This repo is archived. Thanks!☆46Feb 28, 2020Updated 5 years ago