Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+3059.7%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-2.99%)
Ctf DifficultyThis cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+404.48%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-20.9%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+532.84%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (+394.03%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+17013.43%)
Reverse Shell GeneratorHosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Stars: ✭ 238 (+255.22%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+255.22%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+9258.21%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+705.97%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1792.54%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (+50.75%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+173.13%)
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+401.49%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (+319.4%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+659.7%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+13505.97%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (+1461.19%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-10.45%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-31.34%)
CtfCTF writeups
Stars: ✭ 45 (-32.84%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+13304.48%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-29.85%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1589.55%)
Labs PentestFree Labs to Train Your Pentest / CTF Skills
Stars: ✭ 46 (-31.34%)
WebwhatsappbotCore to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-11.94%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-2.99%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-32.84%)
Libc DatabaseBuild a database of libc offsets to simplify exploitation
Stars: ✭ 1,122 (+1574.63%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-14.93%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-34.33%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-13.43%)
Rocket ShotBackwards program slice stitching for automatic CTF problem solving.
Stars: ✭ 43 (-35.82%)
Ctfclictfcli is a tool to manage Capture The Flag events and challenges
Stars: ✭ 43 (-35.82%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-14.93%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+12713.43%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1405.97%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-14.93%)
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-37.31%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (+0%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1402.99%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-5.97%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-16.42%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-38.81%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-19.4%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-40.3%)
CtfcracktoolsChina's first CTFTools framework.中国国内首个CTF工具框架,旨在帮助CTFer快速攻克难关
Stars: ✭ 1,118 (+1568.66%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1501.49%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1380.6%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+1353.73%)