Isotech42 / CTFd-RedHerringLinks
The RedHerring plugin is an extension for the CTFd platform that introduces a new type of challenge. It aims to promote fairness and prevent flag sharing among participating teams in Capture The Flag (CTF) competitions. With dynamically created Docker containers and unique flags for each team, this plugin enhances the security and integrity in C…
☆10Updated last year
Alternatives and similar repositories for CTFd-RedHerring
Users that are interested in CTFd-RedHerring are comparing it to the libraries listed below
Sorting:
- https://lolad-project.github.io/☆78Updated 6 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- CTFd plugin allowing for individual Docker containers per team☆15Updated 3 months ago
- VM Lab for security☆9Updated last year
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆126Updated 5 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- PowerShell Script Analyzer☆69Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆38Updated 3 weeks ago
- OAuth 2.0 exploitation, attack and research tools.☆12Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- Security feed, done in the stupid simple way☆25Updated 6 months ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- ☆76Updated last year
- ☆21Updated 2 years ago
- ☆109Updated 8 months ago
- Volatility, on Docker 🐳☆34Updated 3 months ago
- ☆37Updated 2 years ago
- ☆13Updated 11 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- C2 Automation using Linode☆82Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 10 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Upload files done during my research.☆162Updated 3 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆16Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago