A CTF platform used in IceCTF 2016
☆70Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for ColdCore
Users that are interested in ColdCore are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A platform for running CTFs☆35May 28, 2016Updated 9 years ago
- Polynomial Matrix Library. Additions to NTL and FLINT libraries, with a focus on univariate polynomial matrices, structured matrices, and…☆22Jan 22, 2026Updated 2 months ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- ☆26Apr 23, 2021Updated 4 years ago
- ▶️ to 🧜♀️☆14Feb 21, 2022Updated 4 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Aug 22, 2018Updated 7 years ago
- Designatived verifier Schnorr signatures☆13Nov 4, 2022Updated 3 years ago
- Rigorous computation of the endomorphism ring of a Jacobian☆11Jul 31, 2025Updated 7 months ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- Java bytecode editor☆11May 11, 2016Updated 9 years ago
- In service of posteriority☆45Feb 1, 2026Updated last month
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- Implementation of RC4 and its FMS Attack☆19May 18, 2022Updated 3 years ago
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Crowdsourcing project for the database of numbers of isomorphism types of finite groups☆12Feb 20, 2024Updated 2 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Tools about security.txt for Ruby☆20Oct 14, 2023Updated 2 years ago
- Stego Helper Identification Tool☆27Nov 12, 2018Updated 7 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆90Dec 25, 2025Updated 2 months ago
- Writeups for Pico CTF 2017 capture the flag hacking compeition☆14Mar 21, 2018Updated 8 years ago
- NSEC3 Zone Walker☆13Nov 27, 2025Updated 3 months ago
- Yet another CTF platform☆146Nov 29, 2017Updated 8 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Lab To Pratice Web Hacking☆26Jun 14, 2019Updated 6 years ago
- Proof of Concept for the "Zero Knowledge State Channel", a novel construction for increasing scalability while also enforcing privacy pre…☆13Apr 2, 2023Updated 2 years ago
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- for intigriti web challenges☆16Apr 11, 2023Updated 2 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- A bibtex plugin for Jekyll (based on bibtex2html)☆38Oct 4, 2024Updated last year