CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms
☆12Jan 5, 2016Updated 10 years ago
Alternatives and similar repositories for Cookbook-CTF
Users that are interested in Cookbook-CTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collaborative CTF framework written in Django.☆17Nov 6, 2014Updated 11 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Apr 4, 2017Updated 9 years ago
- Loot email addresses from commit entries☆58Aug 24, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Yet another CTF platform☆147Nov 29, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- CableTap public disclosure documents.☆79Jul 29, 2017Updated 8 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 3 months ago
- Old Gus' Daggerheart System Reference Document☆34Mar 30, 2026Updated last week
- TCP Remote Top - A top like utility to visualize outgoing connections with statistics.☆16Feb 7, 2016Updated 10 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 11 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆19Mar 6, 2012Updated 14 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- A python script for automating the collection of web pages with Hunchly.☆11Jan 11, 2021Updated 5 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago