General purpose attack-defense range for zero-config deployment
☆44Nov 20, 2025Updated 3 months ago
Alternatives and similar repositories for glitch
Users that are interested in glitch are comparing it to the libraries listed below
Sorting:
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- Challenges and writeups for the US Cyber Open for 2024☆21Jun 11, 2024Updated last year
- Runs exploits, fast.☆113Oct 11, 2025Updated 4 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Jun 13, 2023Updated 2 years ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Feb 17, 2026Updated last week
- DCZia DC31 Badge☆15Jul 12, 2025Updated 7 months ago
- Open source CTF platform☆20Feb 11, 2026Updated 2 weeks ago
- An exploit farm for attack/defense CTFs.☆28Feb 14, 2026Updated 2 weeks ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87May 25, 2023Updated 2 years ago
- This has all of my resources advised in my youtube channel for the TMUA exam☆20Jan 7, 2025Updated last year
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- Network analysis tool for Attack Defence CTF☆424Oct 6, 2025Updated 4 months ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- ☆28Aug 2, 2023Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Scripts and things.☆13Jan 23, 2026Updated last month
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆347May 24, 2022Updated 3 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆115Feb 17, 2026Updated last week
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A page with resources, and problem editorials, relating to Cyprus Olympiad in Informatics☆10Feb 16, 2026Updated last week
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Jan 22, 2026Updated last month
- Source for challenges from bi0sCTF☆49Jun 15, 2025Updated 8 months ago
- Automatic tool to quickly start a pwn CTF challenge☆45Nov 3, 2023Updated 2 years ago
- A small mod to make carts drop themselves instead of their components☆13Nov 26, 2022Updated 3 years ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- ☆11Apr 1, 2025Updated 11 months ago
- defcon 30 30-in-One badge☆10Sep 11, 2022Updated 3 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- ☆13Mar 1, 2024Updated 2 years ago