OpenAttackDefenseTools / atakaLinks
Runs exploits, fast.
☆94Updated last year
Alternatives and similar repositories for ataka
Users that are interested in ataka are comparing it to the libraries listed below
Sorting:
- Network analysis tool for Attack Defence CTF☆375Updated 3 months ago
- Attack & Defense CTF Farm based on DestructiveFarm☆111Updated last month
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆85Updated 2 years ago
- Exploit distribution system for A&D competitions☆48Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆229Updated last year
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆40Updated 11 months ago
- ☆172Updated 3 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆48Updated last year
- My notes on pwn☆288Updated last month
- General purpose attack-defense range for zero-config deployment☆37Updated 7 months ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated 3 months ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆334Updated 3 years ago
- ☆109Updated last year
- Files + Writeups for DownUnderCTF 2023 Challenges☆171Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- A full English version of the popular ctf-wiki☆100Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆110Updated 4 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆90Updated this week
- ☆36Updated 2 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆154Updated 10 months ago
- 🐍 Solving CTF challenges using Z3 and Python☆62Updated 2 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆581Updated last week
- 'Ike: A binary exploitation and reversing handbook.☆85Updated last month
- various docs (that are interesting, or not, depending on the point of view...)☆129Updated last year
- knowledge is power☆228Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- ☆45Updated 2 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago