bars
CyberSecurity ToolKit
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
CTF platforms
Links to available CTF platforms to put skills and tools to the test
hashtag
Always Online
Crackmes.one
crackmes.one
chevron-right
Reverse engineering CTF challenges
Defend the Web
defendtheweb.net
chevron-right
Level by Level with increasing difficulty - Tests your web app hacking skills
Microcorruption
microcorruption.com
chevron-right
Specifically challenges geared towards embedded devices
Cyber Mastery: Community Inspired. Enterprise Trusted.
Hack The Box
chevron-right
Red Team platform with OSINT, DFIR, Crypto etc. challenges
MysteryTwister - The Cipher Challenge Contest
www.mysterytwisterc3.org
chevron-right
Cryptography based CTF challenges
OverTheWire: Wargames
overthewire.org
chevron-right
Level by Level with increasing difficulty - Provides training on essential CLI techniques
http://pwn.eonew.cn/
pwn.eonew.cn
chevron-right
Reverse engineering - Binary exploitation CTF challenges
SmashTheStack Wargaming Network
smashthestack.org
chevron-right
Level by Level with increasing difficulty - Provides training on essential CLI techniques
TryHackMe | Cyber Security Training
TryHackMe
chevron-right
Similar to HackTheBox but provides more of a hand-holding tutorial based experience
http://reversing.kr/
reversing.kr
chevron-right
Reverse engineering CTF challenges
Viblo CTF | Hack The Brain - Capture The Fun
Viblo CTF
chevron-right
CTF with challenges and educational resources
Google CTF
capturetheflag.withgoogle.com
chevron-right
Hacker101 CTF
ctf.hacker101.com
chevron-right
XSS game
xss-game.appspot.com
chevron-right
An Educational CTF style for XSS
hashtag
hashtag
Self-Hosted
https://github.com/bkimminich/juice-shop
github.com
chevron-right
Not technically a CTF but is a purposefully vulnerable web app designed to test your abilities at attacking the OWASP top ten
GitHub - rapid7/metasploitable3: Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
GitHub
chevron-right
Virtual machine used to train and practice MetaSploit techniques. Provided by Rapid7.
Vulnerable By Design ~ VulnHub
www.vulnhub.com
chevron-right
Collection of virtual machines with purpose built vulnerabilities
Previous
About the Turnip
chevron-left
Next
Security Tools
chevron-right
Last updated
4 years ago
Always Online
Self-Hosted
sun-bright
desktop
moon
sun-bright
desktop
moon