CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-69.4%)
CtfscoreboardScoreboard for Capture The Flag competitions.
Stars: ✭ 148 (-19.13%)
Gitlab rceRCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1
Stars: ✭ 104 (-43.17%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6165.57%)
Ctf.tfA database of collected CTFs and their solutions.
Stars: ✭ 153 (-16.39%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-38.8%)
PspyMonitor linux processes without root permissions
Stars: ✭ 2,470 (+1249.73%)
Print My ShellPython script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (-23.5%)
Ctf WriteupsWriteups of Capture The Flag Competitions
Stars: ✭ 101 (-44.81%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-49.18%)
Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (-30.6%)
AtomicpurpleteamAtomic Purple Team Framework and Lifecycle
Stars: ✭ 155 (-15.3%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-33.33%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (-7.1%)
JlscaSide-channel toolkit in Julia
Stars: ✭ 114 (-37.7%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+1056.83%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (-6.01%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+634.43%)
StegbruteFast Steganography bruteforce tool written in Rust useful for CTF's
Stars: ✭ 134 (-26.78%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-50.82%)
Pax💀 🔓 CLI tool for PKCS7 padding oracle attacks
Stars: ✭ 90 (-50.82%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-28.96%)
Ctf WriteupsThings we learned from Capture The Flag hacking competitions we participated in.
Stars: ✭ 155 (-15.3%)
AncypwnScript to setup pwn environment for CTF with Docker
Stars: ✭ 126 (-31.15%)
Write Ups 2017Wiki-like CTF write-ups repository, maintained by the community. 2017
Stars: ✭ 2,066 (+1028.96%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (-32.24%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-15.85%)
KarkinosPenetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
Stars: ✭ 115 (-37.16%)
AppjaillauncherCTF Challenge Framework for Windows 8 and above
Stars: ✭ 115 (-37.16%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-24.04%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-37.7%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+5546.45%)
BkcrackCrack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (-2.73%)
CtfCtf solutions from p4 team
Stars: ✭ 1,395 (+662.3%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (-20.77%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (-43.72%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-9.84%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-44.81%)
Glibc All In One🎁A convenient glibc binary and debug file downloader and source code auto builder
Stars: ✭ 145 (-20.77%)
Reverse Shell Manager🔨 A multiple reverse shell session/client manager via terminal
Stars: ✭ 171 (-6.56%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (-49.73%)
WreckuestsYet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (-25.14%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+613.66%)
Lctf2017Source code, writeups and exps in LCTF2017.
Stars: ✭ 162 (-11.48%)
FlowerTCP flow analyzer with sugar for A/D CTF
Stars: ✭ 88 (-51.91%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+0%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+1341.53%)
DiffaiA certifiable defense against adversarial examples by training neural networks to be provably robust
Stars: ✭ 171 (-6.56%)
CtfCTF write-ups and some wargame sites write-ups.
Stars: ✭ 157 (-14.21%)