Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy
☆11Jul 18, 2024Updated last year
Alternatives and similar repositories for CyberChallenge.IT-AD-2024
Users that are interested in CyberChallenge.IT-AD-2024 are comparing it to the libraries listed below
Sorting:
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- A subset of CTF challenges I have made over the years.☆18Aug 4, 2022Updated 3 years ago
- Source code of the challenges developed for the 2024 edition of openECSC☆76Oct 1, 2024Updated last year
- ☆29Dec 11, 2025Updated 2 months ago
- TidalRPC is a program that uses Tidal's SteelSeries integration to display Discord Rich Presence.☆11Jan 19, 2026Updated last month
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- 👾 template repo for getting started with opengl together with imgui using cmake☆11Jul 20, 2024Updated last year
- A Discord bot for Among Us, written in Node.js.☆10Nov 11, 2021Updated 4 years ago
- a low cost 3d lidar based on ydlidar-x4☆11Apr 10, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- A Python obfuscator using Python's abstract Syntax trees to change all variable names to different Unicode variations of X.☆11Jun 27, 2020Updated 5 years ago
- Arduino-compatible Atmega32U4 board which fits inside a USB port☆12Nov 22, 2023Updated 2 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- ☆13Feb 4, 2024Updated 2 years ago
- An UWP app to consult Classeviva's website☆11Feb 1, 2026Updated last month
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 7 months ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- ☆12Dec 12, 2022Updated 3 years ago
- ☆11Mar 16, 2016Updated 9 years ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable arc…☆14Updated this week
- Source code and data about our large scale study about Java annotaion in practice☆12Apr 14, 2023Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Feb 5, 2026Updated 3 weeks ago
- ☆11Oct 14, 2024Updated last year
- All Exploit List Made By Me☆17Apr 7, 2025Updated 10 months ago
- Packaging the systems and operations of the Chameleon testbed☆18Feb 24, 2026Updated last week
- Getting started with Decisions-Disruptions☆11Jan 28, 2020Updated 6 years ago
- Jepsen tests for local filesystems, running on a single node.☆16Aug 15, 2022Updated 3 years ago