Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens
☆87May 25, 2023Updated 2 years ago
Alternatives and similar repositories for ICC2022-AD-CTF
Users that are interested in ICC2022-AD-CTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Runs exploits, fast.☆113Oct 11, 2025Updated 5 months ago
- Network analysis tool for Attack Defence CTF☆430Oct 6, 2025Updated 5 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆70Jul 5, 2025Updated 8 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆349May 24, 2022Updated 3 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Inti easter challenge poc☆18May 4, 2021Updated 4 years ago
- Extendable Visualization & Exploitation tool for glibc heap☆74May 5, 2025Updated 10 months ago
- ☆28Nov 18, 2021Updated 4 years ago
- TCP flow analyzer with sugar for A/D CTF☆142Dec 8, 2022Updated 3 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- ☆17Aug 26, 2024Updated last year
- PAWNYABLE!☆235May 30, 2024Updated last year
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 4 months ago
- Discord bot focused on managing and organising CTFs / Security stuff☆18Nov 22, 2024Updated last year
- A vulnerable Python/Flask WebApp for educational purpose.☆16Apr 29, 2022Updated 3 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆53Jul 19, 2024Updated last year
- C4T BuT S4D Attack-Defence CTF☆13Feb 6, 2022Updated 4 years ago
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- aNOther CTF platform☆30Jan 23, 2026Updated 2 months ago
- phpfuck: using only 5 different characters to write and execute php // (^.9)☆20Nov 26, 2021Updated 4 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- Find all libraries on cdn.js that pollute your prototype☆19Sep 1, 2022Updated 3 years ago
- ☆11Oct 13, 2025Updated 5 months ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- Simple volatility profile builder based on Docker container☆21Aug 24, 2020Updated 5 years ago
- Reject membrane, embrace monke☆10Jan 7, 2022Updated 4 years ago
- Stereotyped Challenges (2014~2023)☆84Jan 17, 2023Updated 3 years ago