CTFd / touristLinks
Tourist is an HTTP API around Microsoft Playwright for CTF challenges
☆13Updated 7 months ago
Alternatives and similar repositories for tourist
Users that are interested in tourist are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆203Updated last month
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 6 months ago
- Capture the flag challenges☆81Updated 9 months ago
- Challenge infrastructure used for the DownUnderCTF competition☆25Updated 5 months ago
- Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can acces…☆86Updated 4 years ago
- A curated list of awesome browser security learning material.☆148Updated 3 years ago
- Vulnerable Python Application To Learn Secure Development☆126Updated last year
- Trail of Bits Testing Handbook - appsec.guide☆92Updated this week
- Docker Challenge creation for CTFd. Allows per team/user containers!☆108Updated 9 months ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆141Updated 3 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 4 years ago
- XS-Leak Browser Test Suite☆85Updated 2 years ago
- Damn Vulnerable IoT Device☆214Updated last year
- XS-Leaks Wiki☆175Updated 8 months ago
- Discord webhook plugin for CTFd☆41Updated last year
- Web Exploitation Workflow for CTF Challenges☆53Updated 9 years ago
- redpwn's challenge deployment system☆28Updated 2 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆308Updated this week
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆142Updated 11 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 3 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆68Updated 7 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated last year
- materials we hand out☆147Updated 6 months ago
- OWASP IoT Security Verification Standard (ISVS)☆148Updated 4 months ago
- CTF write-ups☆100Updated 4 months ago
- Damn Vulnerable Java (EE) Application☆144Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆82Updated 3 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆41Updated 2 months ago
- A small collection of potentially useful contract templates☆418Updated last month