OpenAttackDefenseTools / atakaLinks
Runs exploits, fast.
☆86Updated last year
Alternatives and similar repositories for ataka
Users that are interested in ataka are comparing it to the libraries listed below
Sorting:
- Network analysis tool for Attack Defence CTF☆340Updated last month
- Attack & Defense CTF Farm based on DestructiveFarm☆100Updated 8 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆47Updated last year
- Exploit distribution system for A&D competitions☆45Updated 8 months ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆39Updated 9 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- ☆165Updated 3 years ago
- My notes on pwn☆287Updated this week
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆219Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- ☆101Updated last year
- Files + Writeups for DownUnderCTF 2023 Challenges☆171Updated last year
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- General purpose attack-defense range for zero-config deployment☆30Updated 5 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆55Updated last year
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆329Updated 3 years ago
- knowledge is power☆221Updated last month
- A script to download all the challenges and files from the CTFd instance.☆58Updated last month
- A full English version of the popular ctf-wiki☆98Updated last year
- ☆45Updated 2 years ago
- Useful scripts from past CTF challenges☆34Updated last week
- ☆37Updated 2 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆72Updated this week
- C4T BuT S4D Attack-Defence CTF☆13Updated 3 years ago
- Write-ups for various CTF☆192Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆82Updated 6 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆106Updated 4 years ago
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆116Updated 2 weeks ago
- Source code of the challenges developed for the 2024 edition of openECSC☆73Updated 10 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆79Updated last week