Blackslashtech / glitchLinks
General purpose attack-defense range for zero-config deployment
☆39Updated 3 weeks ago
Alternatives and similar repositories for glitch
Users that are interested in glitch are comparing it to the libraries listed below
Sorting:
- A script to download all the challenges and files from the CTFd instance.☆61Updated 5 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Runs exploits, fast.☆106Updated 2 months ago
- Useful scripts from past CTF challenges☆40Updated 2 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Updated last year
- The most complete code auditing platform with thousands of real-world challenges☆133Updated 5 months ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 2 months ago
- CTFd plugin allowing for individual Docker containers per team☆21Updated 2 months ago
- Web interface to explore Suricata EVE outputs☆78Updated last week
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆158Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆169Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆157Updated last year
- C4T BuT S4D Attack-Defence CTF☆12Updated 3 years ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆51Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆28Updated last year
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆18Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Updated 3 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆53Updated last month
- Official writeups for Hack The Boo CTF 2023☆45Updated last year
- Search engine for CTF writeups with instant results.☆152Updated 9 months ago
- Collection of steganography tools for images and text☆42Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 10 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87Updated 2 years ago
- Attack & Defense CTF Farm based on DestructiveFarm☆122Updated 4 months ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- Docker Challenge creation for CTFd. Allows per team/user containers!☆107Updated 7 months ago
- 🧞♂️ malware analysis☆37Updated last year