An Intrusion Prevention System for Attack-Defense CTFs
☆52Jul 19, 2024Updated last year
Alternatives and similar repositories for ctf_proxy
Users that are interested in ctf_proxy are comparing it to the libraries listed below
Sorting:
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Fingerprinting TCP/IP☆34Jul 8, 2024Updated last year
- Firegex, a firewall for Attack-Defense CTFs☆93Nov 11, 2025Updated 4 months ago
- Scarica il file e mandami un writeup se riesci a risolvere la CTF :)☆23Jul 9, 2023Updated 2 years ago
- ☆12Jun 12, 2024Updated last year
- Network analysis tool for Attack Defence CTF☆429Oct 6, 2025Updated 5 months ago
- Attack & Defense CTF Farm based on DestructiveFarm☆129Aug 8, 2025Updated 7 months ago
- Intrusion Detection and Counter Attack System - CTF Attack/Defense tool☆20Dec 10, 2022Updated 3 years ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆349May 24, 2022Updated 3 years ago
- Runs exploits, fast.☆113Oct 11, 2025Updated 5 months ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆179Dec 6, 2023Updated 2 years ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆638Dec 7, 2022Updated 3 years ago
- Exploit distribution system for A&D competitions☆51Nov 26, 2025Updated 3 months ago
- ExploitFarm is an attacker and flag submitter for A/D CTF☆40Updated this week
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Attack/Defense CTF scoreboard parser☆14Aug 20, 2022Updated 3 years ago
- A framework that help to create CTF Attack with Defense competition quickly☆27Oct 29, 2018Updated 7 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆122Mar 9, 2026Updated last week
- A collection of pyjails!☆28Dec 15, 2025Updated 3 months ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- FAUST Gameserver for attack-defense CTFs☆103Nov 21, 2025Updated 3 months ago
- OWABF2 is a password spraying OWA bruteforcer featuring 3 different modes of bruteforcing☆16Jul 3, 2019Updated 6 years ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆89Feb 21, 2026Updated 3 weeks ago
- ☆31Jan 31, 2026Updated last month
- ☆24Apr 1, 2025Updated 11 months ago
- Peaceful Farm is an Exploit Manager for Attack Defense CTFs, with a server to collect and submit flags, and a client to exploit adversary…☆10Apr 13, 2025Updated 11 months ago
- CVE-2022-36946 linux kernel panic in netfilter_queue☆22Jun 21, 2024Updated last year
- Learn how to intercept flutter apps☆23Jan 19, 2024Updated 2 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆29Mar 8, 2022Updated 4 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- 🚩 Flag Acquisition and Submission Tool — Make writing exploits your only concern during A/D☆27Aug 5, 2024Updated last year
- PCAP-over-IP server written in Golang☆41Jun 2, 2025Updated 9 months ago
- Collection of all my configuration files for utilities & tools I use. Oh and did I mention I use Arch btw!☆24Feb 17, 2026Updated last month
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- Track Kubernetes CVEs by native GitHub notifications!☆13May 7, 2024Updated last year
- Utility to export logseq pages as standard markdown☆17Jul 17, 2025Updated 8 months ago
- Educational and instructional program developed in C# to manage personal expenses☆11Mar 2, 2024Updated 2 years ago