xnomas/web-ctf-help
Collection of scripts to help with web based ctfs.
This tool helps cybersecurity enthusiasts participating in web-based Capture The Flag (CTF) challenges. It takes a website URL as input and extracts hidden information such as HTML comments, JavaScript sources, image URLs, and HTTP headers. CTF players can use this to quickly uncover clues and potential vulnerabilities.
No commits in the last 6 months.
Use this if you are actively participating in web CTFs and need a quick way to inspect a target website for hidden information, similar to what a browser's developer tools might show, but with focused extraction capabilities.
Not ideal if you need a comprehensive web vulnerability scanner or a general-purpose web crawler for broad data extraction.
Stars
21
Forks
3
Language
Python
License
GPL-3.0
Category
Last pushed
May 30, 2021
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/perception/xnomas/web-ctf-help"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
scrapy/scrapy
Scrapy, a fast high-level web crawling & scraping framework for Python.
Altimis/Scweet
A simple and unlimited twitter scraper : scrape tweets, likes, retweets, following, followers,...
lexiforest/curl_cffi
Python binding for curl-impersonate fork via cffi. A http client that can impersonate browser...
plabayo/rama
modular service framework to move and transform network packets
scrapinghub/spidermon
Scrapy Extension for monitoring spiders execution.