Skip to content

Commit 6eeefa5

Browse files
committed
1 parent eb504b2 commit 6eeefa5

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,6 @@ It takes time to build up collection of tools used in CTF and remember them all.
4141
- [Wikis](#wikis)
4242
- [Writeups Collections](#writeups-collections)
4343

44-
4544
# Create
4645

4746
*Tools used for creating CTF challenges*
@@ -129,7 +128,7 @@ Check solve section for steganography.
129128
- [Nozzlr](https://github.com/intrd/nozzlr) - Nozzlr is a bruteforce framework, trully modular and script-friendly.
130129
- [Ophcrack](http://ophcrack.sourceforge.net/) - Windows password cracker based on rainbow tables.
131130
- [Patator](https://github.com/lanjelot/patator) - Patator is a multi-purpose brute-forcer, with a modular design.
132-
- [Turbo Intruder](https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack) - Burp Suite extension for sending large numbers of HTTP requests
131+
- [Turbo Intruder](https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack) - Burp Suite extension for sending large numbers of HTTP requests
133132

134133
## Exploits
135134

@@ -342,6 +341,7 @@ Check solve section for steganography.
342341
- [Backdoor](https://backdoor.sdslabs.co/) - Security Platform by SDSLabs.
343342
- [Crackmes](https://crackmes.one/) - Reverse Engineering Challenges.
344343
- [CryptoHack](https://cryptohack.org/) - Fun cryptography challenges.
344+
- [CSAW 365](https://365.csaw.io/) - An archive of past CSAWCTF challenges.
345345
- [echoCTF.RED](https://echoctf.red/) - Online CTF with a variety of targets to attack.
346346
- [Exploit Exercises](https://exploit-exercises.lains.space/) - Variety of VMs to learn variety of computer security issues.
347347
- [Exploit.Education](http://exploit.education) - Variety of VMs to learn variety of computer security issues.
@@ -351,6 +351,7 @@ Check solve section for steganography.
351351
- [Hacker101](https://www.hacker101.com/) - CTF from HackerOne
352352
- [Hacking-Lab](https://hacking-lab.com/) - Ethical hacking, computer network and security challenge platform.
353353
- [Hone Your Ninja Skills](https://honeyourskills.ninja/) - Web challenges starting from basic ones.
354+
- [INFOSEC INSTITUTE CTF](http://ctf.infosecinstitute.com/) - A set of web Challenges for beginners.
354355
- [IO](http://io.netgarage.org/) - Wargame for binary challenges.
355356
- [Microcorruption](https://microcorruption.com) - Embedded security CTF.
356357
- [Over The Wire](http://overthewire.org/wargames/) - Wargame maintained by OvertheWire Community.
@@ -360,6 +361,7 @@ Check solve section for steganography.
360361
- [Pwnable.kr](http://pwnable.kr/) - Pwn Game.
361362
- [Pwnable.tw](https://pwnable.tw/) - Binary wargame.
362363
- [Pwnable.xyz](https://pwnable.xyz/) - Binary Exploitation Wargame.
364+
- [Pwnadventure](https://www.pwnadventure.com) - An intentionally flawed game.
363365
- [Reversin.kr](http://reversing.kr/) - Reversing challenge.
364366
- [Ringzer0Team](https://ringzer0team.com/) - Ringzer0 Team Online CTF.
365367
- [Root-Me](https://www.root-me.org/) - Hacking and Information Security learning platform.

0 commit comments

Comments
 (0)