#roff #ctf #ctfchallenges #dfir #digitalforensics #forensics #memoryforensics #security #windows
https://github.com/stuxnet999/MemLabs
https://github.com/stuxnet999/MemLabs
GitHub
GitHub - stuxnet999/MemLabs: Educational, CTF-styled labs for individuals interested in Memory Forensics
Educational, CTF-styled labs for individuals interested in Memory Forensics - stuxnet999/MemLabs
#python #artificial_intelligence #cipher #cpp #cryptography #ctf #ctf_tools #decryption #deep_neural_network #hacking #hashes #natural_language_processing #neural_network #pentesting
https://github.com/Ciphey/Ciphey
https://github.com/Ciphey/Ciphey
GitHub
GitHub - bee-san/Ciphey: ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes…
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡ - bee-san/Ciphey
#typescript #24pullrequests #application_security #appsec #ctf #hacking #hacktoberfest #javascript #owasp #owasp_top_10 #owasp_top_ten #pentesting #vulnapp #vulnerable
https://github.com/juice-shop/juice-shop
https://github.com/juice-shop/juice-shop
GitHub
GitHub - juice-shop/juice-shop: OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application - juice-shop/juice-shop
#c_lang #binary_exploitation #cheatsheet #crypto #cryptography #cryptohack #ctf #ctf_challenges #ctf_tools #ctf_writeups #cybersecurity #hackthebox #learning #pentesting #pwn #resources #reverse_engineering #reversing #ssti #steganography #tryhackme
https://github.com/Adamkadaban/CTFs
https://github.com/Adamkadaban/CTFs
GitHub
GitHub - Adamkadaban/CTFs: CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done - Adamkadaban/CTFs
#python #appsec #cicd #ctf #devops #devsecops #infosec #jenkins #security
https://github.com/cider-security-research/cicd-goat
https://github.com/cider-security-research/cicd-goat
GitHub
GitHub - cider-security-research/cicd-goat: A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple…
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges. - cider-security-research/cicd-goat
#python #binary_ninja #capture_the_flag #ctf #debugging #disassembler #gdb #gdbinit #gef #hack #hacktoberfest #hacktoberfest2022 #ida_pro #linux #malware_analysis #peda #pwnable #pwndbg #reverse_engineering
https://github.com/pwndbg/pwndbg
https://github.com/pwndbg/pwndbg
GitHub
GitHub - pwndbg/pwndbg: Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy - pwndbg/pwndbg
#java #aws #azure #ctf #devsecops #docker #gcp #hashicorp_vault #keepass #kubernetes #secrets #secrets_management #security #terraform_aws #terraform_azure #terraform_gcp #vault #vulnerable_web_app
https://github.com/OWASP/wrongsecrets
https://github.com/OWASP/wrongsecrets
GitHub
GitHub - OWASP/wrongsecrets: Vulnerable app with examples showing how to not use secrets
Vulnerable app with examples showing how to not use secrets - OWASP/wrongsecrets
#python #allinonehackingtool #besthackingtool #ctf_tools #ddos_attack_tool #hacker #hacking #linux #password_attack #steganography #web_attack #wireless_attack #xss_attacks #xss_detection
This tool is a comprehensive collection of hacking tools designed for various tasks such as information gathering, wireless attacks, phishing, web attacks, and more. It includes tools for reverse engineering, payload creation, and exploit frameworks. To use it, you need to download the repository, give it the necessary permissions, and run the installation script. The tool supports Linux, Kali Linux, and Parrot OS, and can also be used with Docker. The benefit to the user is having a single platform with a wide range of tools for different hacking needs, making it efficient and convenient. However, it is important to use this tool legally and ethically.
https://github.com/Z4nzu/hackingtool
This tool is a comprehensive collection of hacking tools designed for various tasks such as information gathering, wireless attacks, phishing, web attacks, and more. It includes tools for reverse engineering, payload creation, and exploit frameworks. To use it, you need to download the repository, give it the necessary permissions, and run the installation script. The tool supports Linux, Kali Linux, and Parrot OS, and can also be used with Docker. The benefit to the user is having a single platform with a wide range of tools for different hacking needs, making it efficient and convenient. However, it is important to use this tool legally and ethically.
https://github.com/Z4nzu/hackingtool
GitHub
GitHub - Z4nzu/hackingtool: ALL IN ONE Hacking Tool For Hackers
ALL IN ONE Hacking Tool For Hackers. Contribute to Z4nzu/hackingtool development by creating an account on GitHub.