ECSC2024 / ECSC2024-CTF-JeopardyLinks
Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024
☆40Updated 10 months ago
Alternatives and similar repositories for ECSC2024-CTF-Jeopardy
Users that are interested in ECSC2024-CTF-Jeopardy are comparing it to the libraries listed below
Sorting:
- Runs exploits, fast.☆88Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated 2 months ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆171Updated last year
- Network analysis tool for Attack Defence CTF☆354Updated last month
- Attack & Defense CTF Farm based on DestructiveFarm☆105Updated 3 weeks ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆221Updated last year
- Source code of the challenges developed for the 2024 edition of openECSC☆73Updated 10 months ago
- My notes on pwn☆289Updated 2 weeks ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆151Updated 9 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆79Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- ☆45Updated 2 years ago
- ☆36Updated 2 years ago
- Files + Solutions for DownUnderCTF 2024 Challenges☆115Updated last year
- Source code and documentation for TeamItaly CTF 2023 challenges☆20Updated last year
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆138Updated 6 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆103Updated 8 months ago
- Useful scripts from past CTF challenges☆36Updated this week
- ☆168Updated 3 years ago
- Web interface to explore Suricata EVE outputs☆66Updated last week
- An Intrusion Prevention System for Attack-Defense CTFs☆48Updated last year
- CTF challenge per-team instance runner☆33Updated 8 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆109Updated 4 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆57Updated 2 years ago
- ☆49Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆120Updated last year
- General purpose attack-defense range for zero-config deployment☆31Updated 6 months ago
- ☆49Updated 10 months ago
- CTF write-ups☆97Updated 8 months ago