01Fuzz web applications for vulnerabilities like SQLi, XSS, and LFI, and send HTTP requests
02Disassemble binaries and execute pwntools exploits for reversing and pwn challenges
03Extract hidden information using steganography and forensics tools (e.g., binwalk, exiftool, tshark)
04Crack various hash types and perform cryptographic analysis (e.g., XOR brute-force, frequency analysis)
051 GitHub stars
06Flexible deployment via local Python environment or recommended Docker container