☆49Nov 25, 2025Updated 3 months ago
Alternatives and similar repositories for 2025_CyberForce_Competition
Users that are interested in 2025_CyberForce_Competition are comparing it to the libraries listed below
Sorting:
- ☆49Nov 21, 2024Updated last year
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- ☆18Apr 15, 2025Updated 11 months ago
- ☆15Feb 28, 2026Updated 3 weeks ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆27Feb 1, 2026Updated last month
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 10 months ago
- PowerShell wrapper for the SentinelOne API☆10Jan 4, 2025Updated last year
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Feb 22, 2026Updated 3 weeks ago
- Download your liked TikTok videos.☆18Dec 29, 2021Updated 4 years ago
- All-in-one Scoring Engine☆30Mar 2, 2026Updated 2 weeks ago
- ☆34Oct 24, 2025Updated 4 months ago
- A simple Python encrypted and anonymous chat application written using sockets.☆24Mar 9, 2023Updated 3 years ago
- A simple webhook based Discord bot to announce CTFd solves☆18Jul 5, 2024Updated last year
- ☆32Updated this week
- ☆37Jun 27, 2020Updated 5 years ago
- Python script to create an .stl mesh from .gcode☆25Feb 14, 2024Updated 2 years ago
- Backup your TikTok videos. Download your favorite and posted videos or any public profile videos.☆24Jul 5, 2025Updated 8 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆73Sep 13, 2025Updated 6 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆70Feb 17, 2026Updated last month
- Repository for officially supported Binary Ninja plugins☆56Mar 13, 2026Updated last week
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆31Jan 9, 2025Updated last year
- ☆96Aug 3, 2025Updated 7 months ago
- A tray application for Pi-hole☆69Nov 29, 2025Updated 3 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- Content for BYU CS 240: Advanced Software Construction☆63Mar 3, 2026Updated 2 weeks ago
- ☆36Apr 3, 2023Updated 2 years ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Mar 8, 2026Updated last week
- A flexible playground for Android CTF challenges.☆112Updated this week
- A guide on how to flash IT mode firmware to your LSI Avago 9300-8i RAID Controller, making it an HBA, or Host Bus Adapter.☆141Mar 12, 2025Updated last year
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆58Feb 18, 2026Updated last month
- ☆70Feb 15, 2026Updated last month
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated last month
- ☆61Mar 10, 2025Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆45Jun 30, 2018Updated 7 years ago
- A script to download all the challenges and files from the CTFd instance.☆62Jun 14, 2025Updated 9 months ago
- Flame malware sourcecode available !!☆50Jun 8, 2012Updated 13 years ago
- ☆136Aug 17, 2024Updated last year