ZeratoolAutomatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Ctf weba project aim to collect CTF web practices .
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
RoottheboxA Game of Hackers (CTF Scoreboard & Game Manager)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
CaptfencoderCaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
MbeCourse materials for Modern Binary Exploitation by RPISEC
GraphqlmapGraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
PwndraA collection of pwn/CTF related utilities for Ghidra
PinctfUsing Intel's PIN tool to solve CTF problems
StegcrackerSteganography brute-force utility to uncover hidden data inside files
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
CardinalCTF🚩 AWD (Attack with Defense) 线下赛平台 / AWD platform - 欢迎 Star~ ✨
Vulnhub Ctf WriteupsThis cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
H1veAn Easy / Quick / Cheap Integrated Platform
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Pentest LabPentest Lab on OpenStack with Heat, Chef provisioning and Docker
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
HeapwnLinux Heap Exploitation Practice
Ctf DifficultyThis cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
CtfdCTFs as you need them
ArmpwnRepository to train/learn memory corruption on the ARM platform.
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Hackermind渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Ctf xinetdA docker repository for deploying pwnable challenges in CTF
wani-writeupCTF solutions from Osaka University CTF team Wani Hackase
somaCross-platform CTF problem container manager
ForcADPure-python distributable Attack-Defence CTF platform, created to be easily set up.
BruteSploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
ctfCapture The Flag Information
empirectfEmpireCTF – write-ups, capture the flag, cybersecurity
phdctf-2017PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
YuktiCTFA Game platform to spread awareness among school and university students about various cyber attacks.