List of OSINT Capture The Flag platforms
☆42Mar 27, 2026Updated this week
Alternatives and similar repositories for OSINT-CTFs
Users that are interested in OSINT-CTFs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 10 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Comprehensive guide to AI applications in OSINT workflows and intelligence analysis☆50Jul 14, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Fastest and cheapest distributed residential proxy network.☆17Feb 2, 2026Updated last month
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- ☆23Jul 1, 2025Updated 8 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- List of OSINT Books☆189Mar 6, 2026Updated 3 weeks ago
- ☆12Oct 31, 2022Updated 3 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆32Oct 15, 2025Updated 5 months ago
- Custom Search Engines for OSINT☆142Mar 20, 2026Updated last week
- Java + Native 全自动 SSL Pinning 绕过脚本(Universal SSL Pinning Bypass Script (Java & Native Combined))☆46Jul 1, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆16Apr 29, 2019Updated 6 years ago
- simple ham radio fox for esp32 / SA868☆22Aug 3, 2024Updated last year
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆32Mar 4, 2026Updated 3 weeks ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- ☆59Dec 10, 2025Updated 3 months ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 3 years ago
- ☆57Nov 18, 2025Updated 4 months ago
- CORPINT - Corporate / Business Intelligence☆58Aug 22, 2025Updated 7 months ago
- Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.☆16Updated this week
- Data anonymization & masking of sensitive information in a relational database. Auto detection of sensitive data.☆29Nov 14, 2024Updated last year
- Free Cybersecurity tutorials for beginners with 351 interactive lessons. Easy-to-follow programming guides with hands-on practice exercis…☆32Oct 23, 2025Updated 5 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 11 months ago
- Threat Hunting queries of multiple platforms☆64Feb 26, 2026Updated last month
- read the docs version of risk management☆27Mar 6, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pwny Cup 2K24 quals challenges writeups☆14Nov 9, 2024Updated last year
- Using HardhatWarp for testing☆33Jun 20, 2025Updated 9 months ago
- HashExpoit is Great Tool For Cracking Hash☆28Jul 15, 2020Updated 5 years ago
- CCBYNCSA Creative Commons Open Source Gelblaster XL series "Wingman" robotic turret mod inspired by U.S. Army TARDEC, Open Robotics ROS-M…☆28Feb 25, 2025Updated last year
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆33Nov 14, 2025Updated 4 months ago
- Websites and tools for OSINT investigations pertaining to Israel☆27May 12, 2025Updated 10 months ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago