Skip to content
View Crypto-Cat's full-sized avatar
😸
😸

Block or report Crypto-Cat

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros

JavaScript 492 106 Updated Jan 6, 2026

OLD repo for my GitBook (CTF writeups / vuln research / bugbounty) - please check out cryptocat.me/blog for the updated content!

17 4 Updated Dec 30, 2025

Collection of all previous 1337UP CTF challenges.

Python 78 4 Updated Jan 6, 2025

Security-oriented list of resources about industrial network protocols.

651 91 Updated Dec 9, 2025

CTF Archives: Collection of CTF Challenges.

Python 1,330 179 Updated Dec 29, 2025

CTF challenge (mostly pwn) files, scripts etc

Python 2,389 449 Updated Jan 2, 2026

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,792 4,725 Updated Aug 17, 2020

Code-base to go with academic paper "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic" available @ https://pure.qub.ac.uk/en/publications/redirekt-extracting-malicious-redirecti…

Jupyter Notebook 16 4 Updated Aug 10, 2022

A tool to dump the login password from the current linux user

C 4,065 651 Updated Sep 5, 2025

Username tools for penetration testing

Ruby 1,267 154 Updated Sep 20, 2024

One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

Python 6,364 755 Updated Dec 20, 2025

Metasploit Framework

Ruby 37,220 14,689 Updated Jan 7, 2026

Collection of resources I have used throughout my studies (cybersecurity and systems)

231 30 Updated Jan 7, 2024

Phoenix

C 48 14 Updated Jan 16, 2019

Automated All-in-One OS Command Injection Exploitation Tool

Python 5,576 911 Updated Jan 5, 2026

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 68,028 24,858 Updated Jan 7, 2026

Write-ups for various CTF

Python 217 17 Updated Sep 2, 2025

Writeups for the challenges from DownUnderCTF 2021

Python 180 37 Updated Sep 18, 2022

A repository for learning various heap exploitation techniques.

C 8,362 1,239 Updated Jan 6, 2026

Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.

JavaScript 10,733 2,983 Updated Jan 7, 2026

Writeups for various CTFs

C 672 201 Updated Dec 23, 2025

Notes Taken for HTB Machines & InfoSec Community.

Python 375 64 Updated Aug 8, 2022

Materials from different CTFs for later reuse

HTML 27 1 Updated Mar 23, 2023