OpenAttackDefenseTools / ataka
Runs exploits, fast.
☆83Updated 9 months ago
Alternatives and similar repositories for ataka:
Users that are interested in ataka are comparing it to the libraries listed below
- Network analysis tool for Attack Defence CTF☆317Updated 9 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆81Updated last year
- Attack & Defense CTF Farm based on DestructiveFarm☆90Updated 5 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆200Updated 9 months ago
- ☆162Updated 2 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆314Updated 2 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆36Updated 6 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Exploit distribution system for A&D competitions☆43Updated 5 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆44Updated 9 months ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆40Updated last year
- A full English version of the popular ctf-wiki☆93Updated 10 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- CTF challenge per-team instance runner☆30Updated 4 months ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated last week
- Cheatsheet useful for solving Python-related challenges during CTFs.☆72Updated last week
- Automatic tool to quickly start a pwn CTF challenge☆42Updated last year
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- Write-ups for various CTF☆188Updated last year
- Source code of the challenges developed for the 2024 edition of openECSC☆71Updated 7 months ago
- General purpose attack-defense range for zero-config deployment☆27Updated 2 months ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆44Updated last year
- ☆90Updated last year
- Very simple script(s) to hasten binary exploit creation☆94Updated 3 years ago
- ☆46Updated last year
- 🐍 Solving CTF challenges using Z3 and Python☆60Updated last year
- My notes on pwn☆283Updated 3 weeks ago