Capture The Flag hacker contest daemon
☆33Oct 21, 2017Updated 8 years ago
Alternatives and similar repositories for CTFd
Users that are interested in CTFd are comparing it to the libraries listed below
Sorting:
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- An Open Sourced CTF hosting platform written in php☆10May 24, 2015Updated 10 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- CTF System that allows many things(^_^), used in HackMETU'15, HackMETU'16 and many private contests☆12Feb 20, 2015Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- ARM Trusted Firmware☆14Nov 8, 2017Updated 8 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- ☆54Jul 1, 2012Updated 13 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 11 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago