ECSC2024 / openECSC-2024Links
Source code of the challenges developed for the 2024 edition of openECSC
☆75Updated last year
Alternatives and similar repositories for openECSC-2024
Users that are interested in openECSC-2024 are comparing it to the libraries listed below
Sorting:
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆139Updated 7 months ago
- ☆45Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆229Updated last year
- Write-ups for various CTF☆199Updated last month
- ☆28Updated last year
- Network analysis tool for Attack Defence CTF☆375Updated 3 months ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆171Updated 2 years ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆82Updated 2 months ago
- My notes on pwn☆288Updated last month
- VirtuAlization GDb integrations in pwntools☆35Updated last week
- ☆36Updated 2 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆40Updated 11 months ago
- A Python library to debug binary executables, your own way.☆266Updated this week
- Source code and documentation for TeamItaly CTF 2022 challenges☆42Updated 2 years ago
- Challenges I created for CTF competitions.☆224Updated last month
- Attack & Defense CTF Farm based on DestructiveFarm☆111Updated 2 months ago
- Many-Time Pad Interactive☆178Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆45Updated last year
- Python sandbox escape wiki + payload generator☆118Updated last year
- Files + Solutions for DownUnderCTF 2025 Challenges☆102Updated 2 months ago
- knowledge is power☆228Updated 2 months ago
- gemastik-xvi-final public repository☆16Updated 2 years ago
- A full English version of the popular ctf-wiki☆102Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆129Updated last year
- Hosting awesome cryptography CTF challenges from past CTFs☆124Updated 3 months ago
- A pure python tool to implement/exploit the hash length extension attack☆36Updated 2 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆85Updated 2 years ago
- A toolkit for cryptanalysis using lattices.☆130Updated last year
- Source code and documentation for TeamItaly CTF 2023 challenges☆19Updated 2 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆57Updated this week