JohnHammond / autoctfd
This is a poor-mans framework to automate the creation of a CTFd instance, dynamically recreating challenges and the interface.
☆10Updated 5 years ago
Alternatives and similar repositories for autoctfd:
Users that are interested in autoctfd are comparing it to the libraries listed below
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14Updated 4 years ago
- Local Privilege Escalation Miner☆26Updated 2 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- ☆20Updated 5 years ago
- ☆36Updated 6 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆11Updated 4 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆13Updated 9 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 4 years ago
- Password-protected writeups of HTB platform (challenges and boxes) https://cesena.github.io/☆21Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 9 months ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆26Updated 2 years ago
- ☆26Updated 3 years ago
- Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- All challenges I created for CTF☆12Updated 3 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago