Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/junkaze08/python-ethical-hacking-scripts
Python Scripts and CTF Writeups and Solutions
https://github.com/junkaze08/python-ethical-hacking-scripts
ctf-challenges ctf-solutions ctf-writeups cybersecurity cybersecurity-tools picoctf-writeups picoctf2019 picoctf2021 picoctf2022 picoctf2023 picoctfsolutions
Last synced: 4 days ago
JSON representation
Python Scripts and CTF Writeups and Solutions
- Host: GitHub
- URL: https://github.com/junkaze08/python-ethical-hacking-scripts
- Owner: junkaze08
- Created: 2023-10-24T18:19:01.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2023-10-31T10:34:12.000Z (about 1 year ago)
- Last Synced: 2023-11-01T10:27:29.277Z (about 1 year ago)
- Topics: ctf-challenges, ctf-solutions, ctf-writeups, cybersecurity, cybersecurity-tools, picoctf-writeups, picoctf2019, picoctf2021, picoctf2022, picoctf2023, picoctfsolutions
- Language: Python
- Homepage:
- Size: 2.03 MB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Python Ethical Hacking Scripts
This is a compilation of scripts that can encode and decode a file using Python and CTF (Capture The Flag) writeups that serves as documentation. This serves as my portfolio for my cybersecurity projects, where I showcase my skills, knowledge, and experience in safeguarding digital assets, identifying vulnerabilities, and implementing robust security measures to protect against cyber threats.
## Disclaimer
This project is provided for educational and informational purposes only. The author, Junester Ursora II, makes no representations or warranties of any kind concerning the software, express or implied, including, but not limited to, the warranties of merchantability, fitness for a particular purpose, and non-infringement. Additionally, this project may include CTF (Capture The Flag) writeups and solutions. CTF challenges are designed for learning and testing cybersecurity skills in a controlled environment. The provided solutions are intended for educational purposes and to assist individuals in learning about security concepts.
**Usage of this code is at your own risk.**
By using this software, you agree to assume full responsibility for any consequences and understand that the author will not be held liable for any damages, losses, or legal issues that may arise as a result of its usage.
If you have any questions or concerns, feel free to contact the author.
Author: Junester Ursora II
Email: [email protected]