Capture The Flag hacker contest daemon
☆33Oct 21, 2017Updated 8 years ago
Alternatives and similar repositories for CTFd
Users that are interested in CTFd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- A neat CTFd Dark Theme☆19Feb 1, 2019Updated 7 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- Script (meant to run via cron) to monitor, log, and alert when the CPU is throttled due to overheating☆12Oct 5, 2017Updated 8 years ago
- Coreboot payload for PC Engines APU2 that sort boot order and save it to flash.☆15May 30, 2025Updated 9 months ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- TextMate support for Ini☆15Jun 9, 2022Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- mirror of seabios☆12May 30, 2025Updated 9 months ago
- ☆13Aug 19, 2015Updated 10 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Syntax highlighting for Splunk .conf files in Sublime Text 2 & 3☆12Mar 27, 2021Updated 4 years ago
- Bobbin is a webapp for viewing and sharing twitter threads☆16Jan 25, 2023Updated 3 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago