zardus / ctf-toolsLinks
Some setup scripts for security research tools.
☆9,210Updated 3 weeks ago
Alternatives and similar repositories for ctf-tools
Users that are interested in ctf-tools are comparing it to the libraries listed below
Sorting:
- A curated list of CTF frameworks, libraries, resources and softwares☆11,028Updated last year
- CTF framework and exploit development library☆13,078Updated 2 weeks ago
- CTFs as you need them☆6,413Updated this week
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,599Updated last month
- Collection of CTF Web challenges I made☆2,801Updated 3 months ago
- Ctf solutions from p4 team☆1,835Updated last year
- Web CTF CheatSheet 🐈☆2,891Updated last month
- ✍️ A curated list of CVE PoCs.☆3,458Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2017☆2,154Updated 6 years ago
- Google CTF☆4,857Updated last month
- Course materials for Modern Binary Exploitation by RPISEC☆5,890Updated 3 years ago
- List of Awesome Red Teaming Resources☆7,621Updated last year
- A repository for learning various heap exploitation techniques.☆8,278Updated last week
- Collection of steganography tools - helps with CTF challenges☆2,581Updated 3 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,752Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,692Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,632Updated 7 years ago
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,805Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,527Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,368Updated 2 months ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,672Updated 2 years ago
- CTF Field Guide☆1,398Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,740Updated 2 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,862Updated last month
- Git All the Payloads! A collection of web attack payloads.☆3,851Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,083Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,425Updated last month
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,819Updated 6 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,605Updated last year
- Create randomly insecure VMs☆2,718Updated 2 months ago