Isotech42 / CTFd-RedHerringLinks
The RedHerring plugin is an extension for the CTFd platform that introduces a new type of challenge. It aims to promote fairness and prevent flag sharing among participating teams in Capture The Flag (CTF) competitions. With dynamically created Docker containers and unique flags for each team, this plugin enhances the security and integrity in C…
☆10Updated last year
Alternatives and similar repositories for CTFd-RedHerring
Users that are interested in CTFd-RedHerring are comparing it to the libraries listed below
Sorting:
- CTFd plugin allowing for individual Docker containers per team☆15Updated last month
- ☆12Updated last month
- Slides and materials for conference presentations☆11Updated 2 years ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆13Updated 3 months ago
- Webshell agent in aspx and php☆21Updated this week
- Some of my rough notes for Docker threat detection☆47Updated last year
- https://lolad-project.github.io/☆76Updated 5 months ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆16Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 4 months ago
- A not-curated list of cloud hacking labs☆25Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 3 months ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 8 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆30Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated 2 weeks ago
- ☆32Updated 5 months ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- Living off the False Positive!☆37Updated 4 months ago
- ☆25Updated this week
- ☆69Updated last week
- Bloodhound agent for Mythic☆19Updated last month
- Volatility, on Docker 🐳☆34Updated last month
- Bloodhound Portable for Windows☆51Updated 2 years ago