CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms
☆12Jan 5, 2016Updated 10 years ago
Alternatives and similar repositories for Cookbook-CTF
Users that are interested in Cookbook-CTF are comparing it to the libraries listed below
Sorting:
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- ☆17Oct 5, 2014Updated 11 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- A collaborative CTF framework written in Django.☆17Nov 6, 2014Updated 11 years ago
- BurpJDSer-ng☆29Updated this week
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- FLUXION☆22Oct 3, 2016Updated 9 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 2 months ago
- ☆21Oct 22, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- ☆22May 20, 2016Updated 9 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Loot email addresses from commit entries☆57Aug 24, 2022Updated 3 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- ☆25Oct 6, 2016Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A tool for recover router password☆33Jun 19, 2018Updated 7 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Apr 4, 2017Updated 8 years ago
- CableTap public disclosure documents.☆78Jul 29, 2017Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago