wuntee / vagrant-ctfView external linksLinks
☆13Oct 24, 2017Updated 8 years ago
Alternatives and similar repositories for vagrant-ctf
Users that are interested in vagrant-ctf are comparing it to the libraries listed below
Sorting:
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- iOS Backup Data Protection Analyzer☆31Jul 18, 2013Updated 12 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 2 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- Inspect and manipulate UIWebView-hosted GUIs through Frida.☆51Jun 16, 2025Updated 7 months ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- DC25 Party Badge☆11Aug 7, 2017Updated 8 years ago
- Temporary Email Service Within Terminal☆11Aug 4, 2020Updated 5 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- ☆11Oct 18, 2022Updated 3 years ago
- ☆12Apr 1, 2022Updated 3 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- ☆11May 10, 2017Updated 8 years ago
- Source code for the beta release of CobraDroid☆14Mar 8, 2020Updated 5 years ago
- Python modules which provide a suite of useful utilities for CTFs☆11Nov 1, 2019Updated 6 years ago
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- Assists in mass exportation of Nessus scans☆20Apr 20, 2018Updated 7 years ago
- ☆18May 31, 2022Updated 3 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- ☆17Jan 15, 2013Updated 13 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Docker + Travis-CI + Cron + JohnTheRipper(Jumbo) = Bleeding edge builds☆17Mar 7, 2018Updated 7 years ago
- A simple remedy for Remedy.☆12Sep 19, 2017Updated 8 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 4 years ago
- ☆12May 18, 2015Updated 10 years ago
- Automated Pentest Recon Scanner☆14Jul 29, 2016Updated 9 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- A collection of scripts to interact with Veracode's API☆16Jul 18, 2019Updated 6 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago