☆49Nov 25, 2025Updated 3 months ago
Alternatives and similar repositories for 2025_CyberForce_Competition
Users that are interested in 2025_CyberForce_Competition are comparing it to the libraries listed below
Sorting:
- ☆49Nov 21, 2024Updated last year
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- PowerShell wrapper for the SentinelOne API☆10Jan 4, 2025Updated last year
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- ☆15Updated this week
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 9 months ago
- ☆18Apr 15, 2025Updated 10 months ago
- Download your liked TikTok videos.☆18Dec 29, 2021Updated 4 years ago
- ☆34Oct 24, 2025Updated 4 months ago
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Updated this week
- A simple webhook based Discord bot to announce CTFd solves☆18Jul 5, 2024Updated last year
- Python script to create an .stl mesh from .gcode☆24Feb 14, 2024Updated 2 years ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Feb 1, 2026Updated 3 weeks ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 2 months ago
- Backup your TikTok videos. Download your favorite and posted videos or any public profile videos.☆24Jul 5, 2025Updated 7 months ago
- A simple Python encrypted and anonymous chat application written using sockets.☆24Mar 9, 2023Updated 2 years ago
- ☆31Updated this week
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆30Jan 9, 2025Updated last year
- All-in-one Scoring Engine☆29Feb 16, 2026Updated last week
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Sep 26, 2025Updated 5 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆68Feb 17, 2026Updated last week
- ☆35Apr 3, 2023Updated 2 years ago
- Content for BYU CS 240: Advanced Software Construction☆62Updated this week
- ☆37Jun 27, 2020Updated 5 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆45Jun 30, 2018Updated 7 years ago
- ☆96Aug 3, 2025Updated 6 months ago
- Repository for officially supported Binary Ninja plugins☆57Updated this week
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆58Feb 18, 2026Updated last week
- Flame malware sourcecode available !!☆50Jun 8, 2012Updated 13 years ago
- ☆61Mar 10, 2025Updated 11 months ago
- A flexible playground for Android CTF challenges.☆109Feb 17, 2026Updated last week
- ☆69Jun 20, 2023Updated 2 years ago
- CobaltStrike 4.8 Cracked☆66May 5, 2023Updated 2 years ago
- A tray application for Pi-hole☆69Nov 29, 2025Updated 3 months ago
- ☆67Feb 15, 2026Updated last week
- A microarchitectural leakage detection framework using dynamic instrumentation.☆80Nov 15, 2025Updated 3 months ago
- A script to download all the challenges and files from the CTFd instance.☆62Jun 14, 2025Updated 8 months ago