Ctfs

CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
Alternatives To Ctfs
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Ciphey16,681
3 months ago50June 06, 202164mitPython
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Awesome Infosec4,810
6 months ago8
A curated list of awesome infosec courses and training resources.
Cloakify1,483
4 years ago7mitPython
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Hackdroid753
a year ago1mit
Pentesting Using Android
Packetwhisper611
3 years agomitPython
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Chashell599
5 years ago5Go
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Covertutils412
6 years ago7September 24, 20174Python
A framework for Backdoor development!
Ctfs379
7 months agoC
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
Maldev235
6 months ago5August 29, 20237mitGo
Golang library for malware development
Sec Pentesting Toolkit136
3 months agoC
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
Alternatives To Ctfs
Select To Compare


Alternative Project Comparisons
Popular Cryptography Projects
Popular Penetration Testing Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
C
Cryptography
Penetration Testing
Reverse Engineering
Cybersecurity
Capture The Flag
Steganography
Pwn