zardus / ctf-tools
Some setup scripts for security research tools.
β8,638Updated 2 weeks ago
Alternatives and similar repositories for ctf-tools:
Users that are interested in ctf-tools are comparing it to the libraries listed below
- A curated list of CTF frameworks, libraries, resources and softwaresβ9,993Updated 5 months ago
- CTF framework and exploit development libraryβ12,290Updated this week
- Web CTF CheatSheet πβ2,709Updated last month
- Git All the Payloads! A collection of web attack payloads.β3,657Updated last year
- Collection of CTF Web challenges I madeβ2,708Updated last year
- Ctf solutions from p4 teamβ1,787Updated 3 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.β4,682Updated this week
- Collection of steganography tools - helps with CTF challengesβ2,437Updated 2 years ago
- List of Awesome Red Teaming Resourcesβ7,026Updated last year
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.β5,619Updated 7 months ago
- βοΈ A curated list of CVE PoCs.β3,356Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2017β2,141Updated 6 years ago
- CTFs as you need themβ5,813Updated 3 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher dataβ5,864Updated 2 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,140Updated last year
- Google CTFβ4,584Updated 3 weeks ago
- A repository for learning various heap exploitation techniques.β7,412Updated last month
- Linux privilege escalation auditing toolβ5,739Updated 11 months ago
- A swiss army knife for pentesting networksβ8,542Updated last year
- PEDA - Python Exploit Development Assistance for GDBβ5,934Updated 5 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,226Updated 4 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ3,850Updated 8 months ago
- Course materials for Modern Binary Exploitation by RPISECβ5,561Updated 3 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.β8,337Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.β8,916Updated 8 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.β4,843Updated 6 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,045Updated 3 months ago
- Monitor linux processes without root permissionsβ5,059Updated 2 years ago
- Tutorials for getting started with Pwntoolsβ1,428Updated 3 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.β8,614Updated 7 months ago