Here are
2,717 public repositories
matching this topic...
A collection of hacking / penetration testing resources to make you better!
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
-
Updated
Oct 20, 2022
-
Python
CTF framework and exploit development library
-
Updated
Nov 28, 2022
-
Python
A curated list of CTF frameworks, libraries, resources and softwares
-
Updated
Nov 5, 2022
-
JavaScript
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
-
Updated
Nov 29, 2022
-
TypeScript
Platform to host Capture the Flag competitions
-
Updated
Nov 19, 2019
-
Hack
Come and join us, we need you!
-
Updated
Nov 29, 2022
-
Python
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
-
Updated
Nov 23, 2022
-
Python
Exploit Development and Reverse Engineering with GDB Made Easy
-
Updated
Nov 28, 2022
-
Python
Course materials for Modern Binary Exploitation by RPISEC
-
Updated
Nov 18, 2022
-
Python
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Monitor linux processes without root permissions
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Wiki-like CTF write-ups repository, maintained by the community. 2017
-
Updated
Dec 31, 2018
-
Python
Automatic SSRF fuzzer and exploitation tool
-
Updated
Mar 23, 2022
-
Python
-
Updated
Sep 15, 2022
-
Ruby
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Improve this page
Add a description, image, and links to the
ctf
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
ctf
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.