☆18Nov 8, 2025Updated 3 months ago
Alternatives and similar repositories for OSINTCTFs
Users that are interested in OSINTCTFs are comparing it to the libraries listed below
Sorting:
- ☆16Nov 13, 2024Updated last year
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- ☆17Dec 18, 2025Updated 2 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- ☆17Feb 23, 2025Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- This repo contains Machines and Notes for practicing for EJPTv2 & CJCA exams☆148Jan 9, 2026Updated last month
- ☆17Jun 14, 2023Updated 2 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- ☆20Nov 28, 2022Updated 3 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- ☆20Sep 24, 2025Updated 5 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Oct 2, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- Offsec Practice Labs is a curated training arsenal for hands-on prep across eCPPTv3, OSCP, and CPTS.☆70Jan 9, 2026Updated last month
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆44Nov 24, 2025Updated 3 months ago
- ☆35Nov 14, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated last year
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- Nakerah-lab☆74Apr 20, 2025Updated 10 months ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year