ArmyCyberInstitute / cmgrLinks
CTF Challenge Manager
☆18Updated 2 years ago
Alternatives and similar repositories for cmgr
Users that are interested in cmgr are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆198Updated 2 weeks ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Updated 5 years ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆140Updated 3 years ago
- Learn Binary Exploitation with sample problems and solutions☆157Updated 2 years ago
- A CLI tool to deploy CTF challenges to a k8 cluster for csictf.☆13Updated 2 years ago
- A CTF framework to create, build, deploy and monitor challenges☆117Updated last month
- Capture the flag challenges☆75Updated 5 months ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- knowledge is power☆227Updated last month
- CTF writeups from The Flat Network Society☆146Updated 2 months ago
- Files + Writeups for DownUnderCTF 2020 Challenges☆167Updated 4 years ago
- Discord webhook plugin for CTFd☆38Updated last year
- The platform used to run picoCTF 2019. (deprecated)☆302Updated last year
- All CTF events☆75Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆100Updated 4 months ago
- ☆25Updated 4 years ago
- ☆144Updated 7 months ago
- 'Ike: A binary exploitation and reversing handbook.☆85Updated last month
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆718Updated 2 weeks ago
- redpwn's CTF platform☆274Updated 7 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆225Updated last year
- ☆36Updated 4 years ago
- Reverse Engineering Resources☆228Updated 7 years ago
- Course materials for teaching cybersecurity in a Capture the Flag environment☆176Updated 4 years ago
- 🕶 Design fun and insightful CTF challenges☆68Updated 3 years ago
- Example pwnable challenge hosted with docker☆227Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- An aggregation of CTF challenges and write-ups for csictf 2020!☆56Updated 2 years ago
- ☆171Updated 3 years ago
- The best resources for learning exploit development☆118Updated 5 years ago