A CTF platform used in IceCTF 2016
☆70Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for ColdCore
Users that are interested in ColdCore are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Polynomial Matrix Library. Additions to NTL and FLINT libraries, with a focus on univariate polynomial matrices, structured matrices, and…☆22Jan 22, 2026Updated 2 months ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- ☆26Apr 23, 2021Updated 4 years ago
- An Open Sourced CTF hosting platform written in php☆10May 24, 2015Updated 10 years ago
- [ARCHIVE - very out of date] Intro textbook for web development with Sinatra and ActiveRecord☆13Dec 31, 2015Updated 10 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- ▶️ to 🧜♀️☆14Feb 21, 2022Updated 4 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Aug 22, 2018Updated 7 years ago
- In service of posteriority☆45Feb 1, 2026Updated last month
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Stego Helper Identification Tool☆27Nov 12, 2018Updated 7 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆90Dec 25, 2025Updated 2 months ago
- Yet another CTF platform☆146Nov 29, 2017Updated 8 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 6 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Lab To Pratice Web Hacking☆26Jun 14, 2019Updated 6 years ago
- Mount an S3 bucket as an NFS filesystem to use it as a Docker or Docker Compose volume.☆11Updated this week
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- for intigriti web challenges☆16Apr 11, 2023Updated 2 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- Collection of PowerShell scripts made by yours truly.☆16Jan 23, 2019Updated 7 years ago
- A sample project illustrating how to write and distribute SageMath extensions☆16Feb 10, 2023Updated 3 years ago
- A Hugo theme using Simple.css for clean, classless styling☆10Mar 14, 2026Updated last week
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Grain of Salt equation generator☆16May 6, 2022Updated 3 years ago
- ☆19Jan 28, 2021Updated 5 years ago
- A Python wrapper for Matrix Synapse admin API☆13Jun 3, 2025Updated 9 months ago