All Projects → Solved Hacking Problem → Similar Projects or Alternatives

816 Open source projects that are alternatives of or similar to Solved Hacking Problem

Privilege Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+3059.7%)
Mutual labels:  hacking, ctf
Rhme 2017
Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-2.99%)
Mutual labels:  hacking, ctf
Awesome Ctf Cheatsheet
CTF Cheatsheet
Stars: ✭ 204 (+204.48%)
Mutual labels:  hacking, ctf
Ctf Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+404.48%)
Mutual labels:  hacking, ctf
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-20.9%)
Mutual labels:  hacking, ctf
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+516.42%)
Mutual labels:  hacking, ctf
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+532.84%)
Mutual labels:  hacking, ctf
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (+394.03%)
Mutual labels:  hacking, ctf
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+17013.43%)
Mutual labels:  hacking, ctf
Reverse Shell Generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Stars: ✭ 238 (+255.22%)
Mutual labels:  hacking, ctf
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+255.22%)
Mutual labels:  hacking, ctf
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+9258.21%)
Mutual labels:  hacking, ctf
Ctf All In One
CTF竞赛权威指南
Stars: ✭ 2,807 (+4089.55%)
Mutual labels:  hacking, ctf
Name That Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+705.97%)
Mutual labels:  hacking, ctf
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1792.54%)
Mutual labels:  hacking, ctf
Hackerone Lessons
Transcribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (+50.75%)
Mutual labels:  hacking, ctf
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+173.13%)
Mutual labels:  hacking, ctf
Ctf
CTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+401.49%)
Mutual labels:  hacking, ctf
Hacker101 Ctf
Hacker101 CTF Writeup
Stars: ✭ 295 (+340.3%)
Mutual labels:  hacking, ctf
Ictf Framework
The iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (+319.4%)
Mutual labels:  hacking, ctf
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+659.7%)
Mutual labels:  hacking, ctf
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+13505.97%)
Mutual labels:  hacking, ctf
Dockerscan
Docker security analysis & hacking tools
Stars: ✭ 1,046 (+1461.19%)
Mutual labels:  hacking
Pyhawk
Searches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-10.45%)
Mutual labels:  hacking
Best Hacking Tools
BEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-31.34%)
Mutual labels:  hacking
Ctf
CTF writeups
Stars: ✭ 45 (-32.84%)
Mutual labels:  ctf
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+13304.48%)
Mutual labels:  hacking
Owasp Workshop Android Pentest
Learning Penetration Testing of Android Applications
Stars: ✭ 60 (-10.45%)
Mutual labels:  ctf
Binary Exploitation
Good to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-29.85%)
Mutual labels:  ctf
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1589.55%)
Mutual labels:  hacking
Labs Pentest
Free Labs to Train Your Pentest / CTF Skills
Stars: ✭ 46 (-31.34%)
Mutual labels:  ctf
Webwhatsappbot
Core to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-11.94%)
Mutual labels:  hacking
B1tifi
ssh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-2.99%)
Mutual labels:  hacking
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-32.84%)
Mutual labels:  ctf
Libc Database
Build a database of libc offsets to simplify exploitation
Stars: ✭ 1,122 (+1574.63%)
Mutual labels:  ctf
Hackphiles
BruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-14.93%)
Mutual labels:  hacking
Tweak Series
Repo for YouTube series
Stars: ✭ 44 (-34.33%)
Mutual labels:  hacking
Cfw2ofw Helper
Providing aid in converting video games.
Stars: ✭ 44 (-34.33%)
Mutual labels:  hacking
Papers
Papers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-13.43%)
Mutual labels:  hacking
Rocket Shot
Backwards program slice stitching for automatic CTF problem solving.
Stars: ✭ 43 (-35.82%)
Mutual labels:  ctf
Ctfcli
ctfcli is a tool to manage Capture The Flag events and challenges
Stars: ✭ 43 (-35.82%)
Mutual labels:  ctf
Knowledge Base
pdf,txt,djvu, various useful books
Stars: ✭ 63 (-5.97%)
Mutual labels:  hacking
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-14.93%)
Mutual labels:  hacking
Pwntools
CTF framework and exploit development library
Stars: ✭ 8,585 (+12713.43%)
Mutual labels:  ctf
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1405.97%)
Mutual labels:  hacking
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-14.93%)
Mutual labels:  hacking
Usb Keystroke Injector
☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-37.31%)
Mutual labels:  hacking
Fail2ban.webexploits
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (+0%)
Mutual labels:  hacking
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1402.99%)
Mutual labels:  hacking
Chimay Red
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-5.97%)
Mutual labels:  hacking
Ctfsubmitter
A flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-16.42%)
Mutual labels:  ctf
Taketv
TakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-38.81%)
Mutual labels:  hacking
Websocket Connection Smuggler
websocket-connection-smuggler
Stars: ✭ 40 (-40.3%)
Mutual labels:  hacking
Whitehat
Information about my experiences on ethical hacking 💀
Stars: ✭ 54 (-19.4%)
Mutual labels:  hacking
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-40.3%)
Mutual labels:  hacking
Deepweb Scappering
Discover hidden deepweb pages
Stars: ✭ 40 (-40.3%)
Mutual labels:  hacking
Ctfcracktools
China's first CTFTools framework.中国国内首个CTF工具框架,旨在帮助CTFer快速攻克难关
Stars: ✭ 1,118 (+1568.66%)
Mutual labels:  ctf
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1501.49%)
Mutual labels:  ctf
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1380.6%)
Mutual labels:  hacking
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+1353.73%)
Mutual labels:  hacking
1-60 of 816 similar projects