A CTF platform used in IceCTF 2016
☆69Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for ColdCore
Users that are interested in ColdCore are comparing it to the libraries listed below
Sorting:
- A platform for running CTFs☆35May 28, 2016Updated 9 years ago
- Platform for hosting CTFs. Node.js is the only real dev language.☆24Dec 19, 2014Updated 11 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Aug 22, 2018Updated 7 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Java bytecode editor☆11May 11, 2016Updated 9 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- A plugin for splitting the scoreboard based on team attributes☆13Dec 28, 2023Updated 2 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- Implementation of RC4 and its FMS Attack☆19May 18, 2022Updated 3 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- Root-Me Badge Generator is a web application that generates badges from Root-me profiles. - https://status.duboc.xyz/status/rootme-badge-…☆15Apr 16, 2025Updated 10 months ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- Questions and k8s setup for IEEE-CTF 2020.☆22Jan 19, 2023Updated 3 years ago
- In service of posteriority☆45Feb 1, 2026Updated 3 weeks ago
- Lab To Pratice Web Hacking☆26Jun 14, 2019Updated 6 years ago
- Simple attacks on AES-ECB☆22Dec 18, 2020Updated 5 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated 3 weeks ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆83Feb 16, 2023Updated 3 years ago
- ☆30Aug 31, 2018Updated 7 years ago
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 8 months ago
- BlackArch Linux Slim ISO☆22Jun 30, 2018Updated 7 years ago
- Stego Helper Identification Tool☆27Nov 12, 2018Updated 7 years ago
- A CTF framework to create, build, deploy and monitor challenges☆118Aug 19, 2025Updated 6 months ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Apr 7, 2024Updated last year
- The hacker technical cheat sheet☆44Feb 11, 2026Updated 2 weeks ago
- ☆10Mar 4, 2024Updated last year
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- Circom circuits such as SHA256, float-add and Fibonacci, developed with Circomkit.☆11Jan 27, 2024Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- use an LLM to translate purpose-statements into code to evaluate their quality☆11Apr 3, 2024Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Custom Kdelive Effect Stacks for quick color correction and grading.☆14May 19, 2025Updated 9 months ago