king of the hill cybersecurity competition
☆31May 4, 2022Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public repository of 2026 crackmes.one CTF RE challenge☆35Mar 10, 2026Updated last month
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- This is a Plugin for the popular CTF Platform CTFd. It's purpose is to share when a User or Team gains firstblood on a challenge. The sup…☆13Jun 11, 2025Updated 10 months ago
- ☆17Dec 18, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆36Feb 4, 2026Updated 2 months ago
- ☆11Dec 27, 2023Updated 2 years ago
- Rhovelionz-Dotfiles☆23Apr 9, 2026Updated last week
- Scripts from Ghidra Golf competitions☆34Jan 24, 2023Updated 3 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r…☆90Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 🚶 Promise-like async control flow library using plain functions☆10May 7, 2018Updated 7 years ago
- ☆30Dec 20, 2025Updated 3 months ago
- A module that allows you to proxy a single hypercore replication stream to multiple peers☆21Jul 5, 2018Updated 7 years ago
- Rust crypto library for zero-knowledge proofs☆20Mar 30, 2026Updated 2 weeks ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 6 months ago
- This is the arduino code for line follower robot with 8 array IR sensor and two motor with motor Driver (L293d IC or L298N module etc.)☆18Apr 13, 2018Updated 8 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 11 years ago
- API for Asset Service☆14Aug 15, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Trying to hack into keyboards☆86Nov 29, 2018Updated 7 years ago
- Cross-platform DJ Library Software☆10Jun 25, 2018Updated 7 years ago
- CurlWright is a Cloudflare bypass tool that leverages Playwright to execute curl commands with full browser capabilities, allowing you to…☆33Mar 9, 2026Updated last month
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆31Jan 31, 2026Updated 2 months ago
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- Tiny and fast port scanner (Sliver edition)☆29Feb 17, 2026Updated last month
- 🌍 My website☆10Nov 23, 2025Updated 4 months ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆21Jan 7, 2019Updated 7 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆72Apr 4, 2026Updated last week
- kerberos in rust for fun and profit☆70Mar 13, 2026Updated last month
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 11 months ago
- Packer stuff to build a Kali 1.0.9 vagrant box☆18Mar 11, 2015Updated 11 years ago