A scoreboard for Security CTF events
☆37Dec 11, 2012Updated 13 years ago
Alternatives and similar repositories for CTF-Scoreboard
Users that are interested in CTF-Scoreboard are comparing it to the libraries listed below
Sorting:
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- CTF System that allows many things(^_^), used in HackMETU'15, HackMETU'16 and many private contests☆12Feb 20, 2015Updated 11 years ago
- scoreserver web application for CTF(Capture The Flag)☆24Aug 3, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Decrypt MITM SSL RDP and save to pcap☆53May 1, 2014Updated 11 years ago
- Flash crossdomain policy security checker☆25Oct 3, 2015Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- Scoring Engine for CTF competitions☆48Feb 15, 2023Updated 3 years ago
- ☆37May 21, 2014Updated 11 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Scoreboard for CTF Competitions☆27Jul 19, 2016Updated 9 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- ☆13May 28, 2013Updated 12 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- crabstone is a Ruby binding to the capstone disassembly library by Nguyen Anh Quynh☆40Sep 14, 2015Updated 10 years ago