JohnHammond / autoctfdLinks
This is a poor-mans framework to automate the creation of a CTFd instance, dynamically recreating challenges and the interface.
☆10Updated 5 years ago
Alternatives and similar repositories for autoctfd
Users that are interested in autoctfd are comparing it to the libraries listed below
Sorting:
- My solutions for pwn and reversing challenges☆10Updated 7 years ago
- Helped during my OSCP lab days.☆15Updated 8 years ago
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- Scripts to make life easier☆12Updated 5 years ago
- ☆36Updated 7 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago
- ☆64Updated 11 months ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 7 months ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- A collection of my public security advisories.☆24Updated 2 months ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- CTF tasks created☆11Updated 2 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Reverse engineering challenges☆51Updated 5 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Training Apps For Mobile Penetration Book☆12Updated 6 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19Updated 5 years ago