htb_dirty_scripts
Dirty code 😈 (by jmau111-org)
awesome-ctf-resources
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩 (by devploit)
htb_dirty_scripts | awesome-ctf-resources | |
---|---|---|
1 | 1 | |
0 | 344 | |
- | - | |
5.3 | 4.0 | |
over 1 year ago | 1 day ago | |
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
htb_dirty_scripts
Posts with mentions or reviews of htb_dirty_scripts.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-26.
-
Hacking Redis
Some CTFs, like [this one](https://github.com/jmau111/htb-dirty-scripts/tree/main/shared], emulate that attack.
awesome-ctf-resources
Posts with mentions or reviews of awesome-ctf-resources.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-05-13.
-
Pwn/RE platforms for study/practice
https://github.com/devploit/ctf-awesome-resources https://github.com/apsdehal/awesome-ctf
What are some alternatives?
When comparing htb_dirty_scripts and awesome-ctf-resources you can also consider the following projects:
Redis-Server-Exploit - This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any authentication
Active-Directory-Exploitation-Cheat-Sheet - A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
juice-shop - OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
CTFs - CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.