Here are
2,544 public repositories
matching this topic...
A collection of hacking / penetration testing resources to make you better!
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
-
Updated
Jun 28, 2022
-
Python
CTF framework and exploit development library
-
Updated
Aug 15, 2022
-
Python
A curated list of CTF frameworks, libraries, resources and softwares
-
Updated
May 10, 2022
-
JavaScript
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
-
Updated
Aug 15, 2022
-
TypeScript
Platform to host Capture the Flag competitions
-
Updated
Nov 19, 2019
-
Hack
Come and join us, we need you!
-
Updated
Aug 10, 2022
-
Python
Course materials for Modern Binary Exploitation by RPISEC
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
-
Updated
Aug 9, 2022
-
Python
Exploit Development and Reverse Engineering with GDB Made Easy
-
Updated
Aug 14, 2022
-
Python
-
Updated
Aug 15, 2022
-
Python
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Monitor linux processes without root permissions
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Wiki-like CTF write-ups repository, maintained by the community. 2017
-
Updated
Dec 31, 2018
-
Python
Automatic SSRF fuzzer and exploitation tool
-
Updated
Mar 23, 2022
-
Python
-
Updated
Feb 11, 2022
-
Ruby
The best tool for finding one gadget RCE in libc.so.6
-
Updated
Aug 12, 2022
-
Ruby
Improve this page
Add a description, image, and links to the
ctf
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
ctf
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.