☆50Nov 25, 2025Updated 5 months ago
Alternatives and similar repositories for 2025_CyberForce_Competition
Users that are interested in 2025_CyberForce_Competition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆48Nov 21, 2024Updated last year
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- ☆19Apr 15, 2025Updated last year
- ☆16Feb 28, 2026Updated 2 months ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆29Feb 1, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell wrapper for the SentinelOne API☆11Jan 4, 2025Updated last year
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated last year
- Cross Compatible Command and Control☆48Dec 18, 2025Updated 5 months ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 11 months ago
- All-in-one Scoring Engine☆33May 10, 2026Updated last week
- Download your liked TikTok videos.☆18Dec 29, 2021Updated 4 years ago
- ☆34Oct 24, 2025Updated 6 months ago
- A simple Python encrypted and anonymous chat application written using sockets.☆24Mar 9, 2023Updated 3 years ago
- A simple webhook based Discord bot to announce CTFd solves☆17Jul 5, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆28Apr 29, 2026Updated 3 weeks ago
- ☆39May 10, 2026Updated last week
- ☆37Jun 27, 2020Updated 5 years ago
- Python script to create an .stl mesh from .gcode☆25Feb 14, 2024Updated 2 years ago
- Backup your TikTok videos. Download your favorite and posted videos or any public profile videos.☆24Mar 21, 2026Updated 2 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆77Sep 13, 2025Updated 8 months ago
- Repository for officially supported Binary Ninja plugins☆57Updated this week
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆83Feb 17, 2026Updated 3 months ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆35Jan 9, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆98Apr 14, 2026Updated last month
- A tray application for Pi-hole☆72Nov 29, 2025Updated 5 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆93Jan 14, 2026Updated 4 months ago
- Content for BYU CS 240: Advanced Software Construction☆65May 12, 2026Updated last week
- ☆36Apr 3, 2023Updated 3 years ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated this week
- A flexible playground for Android CTF challenges.☆116May 9, 2026Updated last week
- A guide on how to flash IT mode firmware to your LSI Avago 9300-8i RAID Controller, making it an HBA, or Host Bus Adapter.☆156Mar 12, 2025Updated last year
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆59Feb 18, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆74May 11, 2026Updated last week
- ☆61Mar 10, 2025Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆121Jan 30, 2026Updated 3 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆45Jun 30, 2018Updated 7 years ago
- Flame malware sourcecode available !!☆51Jun 8, 2012Updated 13 years ago
- A script to download all the challenges and files from the CTFd instance.☆65Jun 14, 2025Updated 11 months ago
- ☆141Aug 17, 2024Updated last year