Cyberlandslaget / kriger
An exploit farm for attack/defense CTFs.
☆19Updated 2 weeks ago
Alternatives and similar repositories for kriger:
Users that are interested in kriger are comparing it to the libraries listed below
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆34Updated 5 months ago
- Find RSA primes in files☆20Updated 2 years ago
- ☆25Updated 4 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆23Updated 2 years ago
- TLS & SNI aware netcat☆41Updated 5 months ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆49Updated 3 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A plugin for splitting the scoreboard based on team attributes☆13Updated last year
- Web interface to explore Suricata EVE outputs☆51Updated 3 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated 9 months ago
- ☆12Updated 2 years ago
- The official challenges and deployment source code files used in San Diego CTF 2022.☆27Updated 2 years ago
- The Django backend running RACTF wargame events.☆25Updated 3 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- ☆47Updated 10 months ago
- Where CTFs happen☆81Updated 10 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- redpwn's challenge deployment system☆25Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆192Updated 8 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Binary Golf Grand Prix☆53Updated 3 weeks ago
- ☆123Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆110Updated 4 months ago
- PCAP-over-IP server written in Golang☆19Updated 3 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 9 months ago
- 🥷 Soothing pastel theme for Binary Ninja☆24Updated 5 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆88Updated last month
- A way to use fonts to obfuscate text.☆44Updated 2 years ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year