RobertLarsen / CTFd
Capture The Flag hacker contest daemon
☆32Updated 7 years ago
Alternatives and similar repositories for CTFd:
Users that are interested in CTFd are comparing it to the libraries listed below
- ☆50Updated 7 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 7 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆20Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- ☆35Updated 12 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 6 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Capture the flag - security challenges☆13Updated 8 years ago
- Malware analysis using Docker project☆25Updated 8 years ago