General purpose attack-defense range for zero-config deployment
☆45Nov 20, 2025Updated 4 months ago
Alternatives and similar repositories for glitch
Users that are interested in glitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- A cli-based, multi-architecture gadget-finding tool, designed for fast operation, even with large binaries like browser engines and OS ke…☆17May 1, 2024Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆21Jun 11, 2024Updated last year
- A/D CTF services developed for ECSC 2022☆13Nov 11, 2022Updated 3 years ago
- Open source CTF platform☆22Mar 30, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Runs exploits, fast.☆115Oct 11, 2025Updated 6 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- slides for talk given during uscg 2023 combine☆36Sep 6, 2023Updated 2 years ago
- An exploit farm for attack/defense CTFs.☆29Feb 14, 2026Updated last month
- Nyarch Wiki is designed to be a straightforward and accessible resource for users of all skill levels.☆21Mar 24, 2026Updated 2 weeks ago
- DCZia DC31 Badge☆15Jul 12, 2025Updated 9 months ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated 2 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Jun 13, 2023Updated 2 years ago
- Network analysis tool for Attack Defence CTF☆436Oct 6, 2025Updated 6 months ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87May 25, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆57Mar 4, 2026Updated last month
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆22Feb 17, 2026Updated last month
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆25Dec 25, 2025Updated 3 months ago
- A high performance Nim implementation of a Cyclic Polynomial Hash, aka BuzHash, and the Rabin-Karp algorithm☆16Apr 2, 2019Updated 7 years ago
- A small mod to make carts drop themselves instead of their components☆13Nov 26, 2022Updated 3 years ago
- ☆20Oct 25, 2024Updated last year
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆344Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆20Sep 10, 2025Updated 7 months ago
- RFID badge for DEF CON☆13Jul 26, 2016Updated 9 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- CookieFarm is a Attack/Defense CTF framework inspired by DestructiveFarm, developed by the Italian team ByteTheCookies. What sets CookieF…☆20Updated this week
- Redon Hub is a Roblox Product Delivery Bot (AKA Hub), it is designed to be as useful as other hub systems such as myPod, Parcel, and more…☆13Jun 27, 2025Updated 9 months ago
- GMP wrapper for the Nim language☆16Dec 8, 2022Updated 3 years ago
- ProxyWatch☆47Apr 3, 2026Updated last week