HackUCF / collabCTFLinks
A collaborative CTF framework written in Django.
☆17Updated 10 years ago
Alternatives and similar repositories for collabCTF
Users that are interested in collabCTF are comparing it to the libraries listed below
Sorting:
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- ☆50Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- ☆25Updated 10 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- ☆20Updated 9 years ago
- misc pentest tools.☆26Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- put this here because archival reasons.☆28Updated 7 years ago