A/D CTF services developed for ECSC 2022
☆12Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for ctf-services
Users that are interested in ctf-services are comparing it to the libraries listed below
Sorting:
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 3 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87May 25, 2023Updated 2 years ago
- This has all of my resources advised in my youtube channel for the TMUA exam☆20Jan 7, 2025Updated last year
- Runs exploits, fast.☆113Oct 11, 2025Updated 4 months ago
- The C Macro☆35Oct 19, 2022Updated 3 years ago
- European Cyber Security Challenge Gameboard☆28Feb 20, 2022Updated 4 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- A 64 bit OS☆10Nov 12, 2025Updated 3 months ago
- A page with resources, and problem editorials, relating to Cyprus Olympiad in Informatics☆10Feb 16, 2026Updated last week
- ☆11Oct 31, 2023Updated 2 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 3 months ago
- Automatic tool to quickly start a pwn CTF challenge☆45Nov 3, 2023Updated 2 years ago
- Bibata Cursor, with support for hyprcursor and Xcursor☆19Jan 28, 2025Updated last year
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 3 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆35Feb 27, 2025Updated last year
- ☆12Dec 16, 2022Updated 3 years ago
- michalspacek.cz + michalspacek.com + subdomains source code because why not☆11Updated this week
- ☆10Feb 1, 2022Updated 4 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Automated Wallpaper Management for Wayland Using Swaybg☆14Jan 5, 2026Updated last month
- use github as a cdn☆13Nov 17, 2025Updated 3 months ago
- Oink Bootloader (OinkBL),系列文[世界第一簡單的UEFI,實作打造自己的開機畫面](https://ithelp.ithome.com.tw/users/20161828/ironman/6446?page=1)☆11Nov 18, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 7 months ago
- Bradford L. Barrett's web server log analysis tool☆14Oct 27, 2014Updated 11 years ago
- ☆14Feb 12, 2026Updated 2 weeks ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago