You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,6 @@ It takes time to build up collection of tools used in CTF and remember them all.
41
41
-[Wikis](#wikis)
42
42
-[Writeups Collections](#writeups-collections)
43
43
44
-
45
44
# Create
46
45
47
46
*Tools used for creating CTF challenges*
@@ -129,7 +128,7 @@ Check solve section for steganography.
129
128
-[Nozzlr](https://github.com/intrd/nozzlr) - Nozzlr is a bruteforce framework, trully modular and script-friendly.
130
129
-[Ophcrack](http://ophcrack.sourceforge.net/) - Windows password cracker based on rainbow tables.
131
130
-[Patator](https://github.com/lanjelot/patator) - Patator is a multi-purpose brute-forcer, with a modular design.
132
-
-[Turbo Intruder](https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack) - Burp Suite extension for sending large numbers of HTTP requests
131
+
-[Turbo Intruder](https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack) - Burp Suite extension for sending large numbers of HTTP requests
133
132
134
133
## Exploits
135
134
@@ -342,6 +341,7 @@ Check solve section for steganography.
342
341
-[Backdoor](https://backdoor.sdslabs.co/) - Security Platform by SDSLabs.
0 commit comments