General purpose attack-defense range for zero-config deployment
☆45Nov 20, 2025Updated 5 months ago
Alternatives and similar repositories for glitch
Users that are interested in glitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Challenges and writeups for the US Cyber Open for 2024☆21Jun 11, 2024Updated last year
- Open source CTF platform☆22Apr 24, 2026Updated last week
- Runs exploits, fast.☆116Oct 11, 2025Updated 6 months ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- ☆13Jun 23, 2022Updated 3 years ago
- An exploit farm for attack/defense CTFs.☆29Feb 14, 2026Updated 2 months ago
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated 3 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- Network analysis tool for Attack Defence CTF☆443Oct 6, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated last month
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87May 25, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 2 months ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆58Mar 4, 2026Updated last month
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆22Feb 17, 2026Updated 2 months ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 4 months ago
- A high performance Nim implementation of a Cyclic Polynomial Hash, aka BuzHash, and the Rabin-Karp algorithm☆16Apr 2, 2019Updated 7 years ago
- A small mod to make carts drop themselves instead of their components☆13Nov 26, 2022Updated 3 years ago
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Sep 13, 2023Updated 2 years ago
- ☆20Oct 25, 2024Updated last year
- RFID badge for DEF CON☆13Jul 26, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago
- Ravage Framework - Powershell weaponized for offensive security professionals.☆78Feb 27, 2026Updated 2 months ago
- ☆13Jan 7, 2015Updated 11 years ago
- GMP wrapper for the Nim language☆16Dec 8, 2022Updated 3 years ago
- awd shell manage,批量执行shell,权限维持,交互式shell☆34Nov 22, 2019Updated 6 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆57Feb 16, 2022Updated 4 years ago