CTFs as you need them
☆30May 3, 2023Updated 2 years ago
Alternatives and similar repositories for CTFd
Users that are interested in CTFd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 2 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆27Sep 28, 2020Updated 5 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Fake msfconsole for the use in demonstrations☆20Oct 13, 2020Updated 5 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 2 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 5 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 5 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59May 16, 2021Updated 4 years ago
- English translation of Cyberhub CTF guidebook + add-ons☆18Jul 10, 2020Updated 5 years ago
- An Obsidian vault to Github Pages workflow to hopefully make me take notes☆51Mar 14, 2022Updated 4 years ago
- The official StrawPoll API v3☆13Oct 8, 2023Updated 2 years ago
- Crappy Python code to render a QR code as "plaintext" with Unicode☆40Apr 20, 2024Updated last year
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Emulate the AWS IoT Button on a Raspberry Pi with a simple push button using this C++ sample☆10Sep 16, 2016Updated 9 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- This is an instagram clone project developed using DJANGO2.22 Framework and Bootstrap 4, to replicate Original Instagram with the aim of …☆10Oct 4, 2023Updated 2 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Free and publicly available training labs and exercises, for quick copy-and-paste demonstrations, learning and education.☆129Feb 27, 2023Updated 3 years ago
- This is a clone of the of Introduction To Linux repo that I developed for the class I taught at the US Coast Guard Academy.☆65Aug 26, 2018Updated 7 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Apr 12, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 4 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Contains all the required AWS Books, Code and materials for learning.☆19May 7, 2024Updated last year
- ☆17Feb 16, 2024Updated 2 years ago
- Blockchain and Smart Contract basic code for "mining" myself !!!☆13Jun 6, 2022Updated 3 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- 用于内网渗透测试的工具包括 crto 认证、AD 渗透以及内网信息收集项目的自存☆18May 31, 2024Updated last year