CTF designed for Middle School-aged kids
☆12Oct 18, 2024Updated last year
Alternatives and similar repositories for KiddoCTF
Users that are interested in KiddoCTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Nginx-based TLS 1.3 proxy with Let's Encrypt automatic certificate renewals☆13Apr 22, 2025Updated 11 months ago
- Небольшой враппер над cadesplugin для работы с КриптоПро☆11Dec 28, 2020Updated 5 years ago
- bmstu, IU7-8, Цифровая Обработка Сигналов (2021)☆11May 3, 2021Updated 4 years ago
- This collection of hypnosis scripts has been curated from various open source repositories.☆20Apr 7, 2019Updated 6 years ago
- Terraform module for the salable deployment of CTFd on AWS☆19Oct 21, 2025Updated 5 months ago
- A library for driving protogens using a HUB75 style matrix☆22Aug 7, 2025Updated 7 months ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- Python scripts using PIL and images2GIF to make animated generative art☆12Sep 2, 2016Updated 9 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- A mail reflector written in Python with modules for SPF, DKIM and DMARC authentication, used as a test system for testing correspondent's…☆13Sep 15, 2016Updated 9 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 8 months ago
- ☆17Sep 24, 2024Updated last year
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 10 months ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- ☆12Nov 15, 2021Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 4 years ago
- LaTeX Report Template for Offensive Security's OSCP Exam.☆14Mar 13, 2022Updated 4 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Rebane's CTF tools☆13Feb 1, 2026Updated last month
- Documentation for IPinfo official client libraries and integrations☆16Jul 23, 2025Updated 8 months ago
- Generate Sequelize model definitions from a Swagger 2.0 schema☆11Nov 13, 2020Updated 5 years ago
- A go implementation of metrics reporting for Circonus☆12Sep 23, 2025Updated 6 months ago
- 100% natural Cherry Cola recipe based on Open Cola recipe.☆35Mar 16, 2021Updated 5 years ago
- Citrix Apps and Desktop - Session Module☆10May 13, 2022Updated 3 years ago
- Fast prime factorization in Python☆25Apr 4, 2022Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Quick Icon is an open project that is a tool for developers that helps them generate necessary icon assets for Xcode.☆10Nov 6, 2020Updated 5 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- Parse and stringify file paths with line and column like `unicorn.js14`☆24Nov 22, 2025Updated 4 months ago
- ☆14Jul 26, 2024Updated last year
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- py5 example code and tutorials☆10Nov 22, 2024Updated last year