Blackslashtech / glitch
General purpose attack-defense range for zero-config deployment
☆27Updated 2 months ago
Alternatives and similar repositories for glitch:
Users that are interested in glitch are comparing it to the libraries listed below
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- A script to download all the challenges and files from the CTFd instance.☆55Updated 2 weeks ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- Runs exploits, fast.☆83Updated 9 months ago
- Challenges and writeups for the US Cyber Open for 2024☆19Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 6 months ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- Lena's repo of Malware Monsters aka Malmons.☆32Updated 2 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 3 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆81Updated last year
- Official writeups for Hack The Boo CTF 2023☆44Updated 5 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 7 months ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆38Updated 2 weeks ago
- Web interface to explore Suricata EVE outputs☆56Updated 5 months ago
- ☆90Updated last year
- ☆45Updated 3 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 5 months ago
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- Useful scripts from past CTF challenges☆34Updated 3 weeks ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆201Updated 2 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated last month
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- C4T BuT S4D Attack-Defence CTF☆13Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆36Updated 6 months ago
- An automatic Blind ROP exploitation tool☆205Updated last year
- A set of tools and resources for analysis of Havoc C2☆12Updated last year