WuerthPhoenix / wpctf2024
☆10Updated 2 months ago
Alternatives and similar repositories for wpctf2024:
Users that are interested in wpctf2024 are comparing it to the libraries listed below
- Writeups ufficiali delle challenge proposte ad OliCyber.IT☆45Updated 8 months ago
- Firegex is an application firewall created for CTF Attack-Defence competitions by Pwnzer0tt1☆47Updated this week
- List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general☆19Updated 3 years ago
- Fingerprinting TCP/IP☆25Updated 7 months ago
- Network analysis tool for Attack Defence CTF☆299Updated 7 months ago
- Scarica il file e mandami un writeup se riesci a risolvere la CTF :)☆23Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆251Updated last month
- ☆6Updated this week
- Main repository for Lag and Crash 4.0☆12Updated 10 months ago
- Many-Time Pad Interactive☆164Updated last year
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆27Updated last year
- A (not so) shitty bruteforcer framework written in Python☆16Updated 3 months ago
- ☆12Updated last year
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆81Updated last year
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)☆30Updated this week
- Docker Challenge creation for CTFd. Allows per team/user containers!☆86Updated last year
- A docker compose infra designed to be securely self-hosted.☆11Updated 3 years ago
- The source code of SSPŠ KB discord bot☆14Updated 3 weeks ago
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆31Updated this week
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆303Updated 2 years ago
- pySigma backend for generating Grafana Loki/LogQL rules☆38Updated last week
- Automated YARA Rule Standardization and Quality Assurance Tool☆192Updated this week
- ☆14Updated 4 months ago
- A production ready Dockered MISP☆204Updated this week
- Steganography significant bits image decoder. Can help you out with some CTF☆30Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆156Updated 2 years ago
- Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer☆64Updated last week
- AssemblyLine 4: File triage and malware analysis☆282Updated this week
- An Intrusion Prevention System for Attack-Defense CTFs☆41Updated 7 months ago