WuerthPhoenix / wpctf2024Links
☆12Updated 7 months ago
Alternatives and similar repositories for wpctf2024
Users that are interested in wpctf2024 are comparing it to the libraries listed below
Sorting:
- Writeups ufficiali delle challenge proposte ad OliCyber.IT☆53Updated 3 months ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Updated last year
- Fingerprinting TCP/IP☆33Updated 11 months ago
- A secure low code honeypot framework, leveraging LLM for System Virtualization.☆1,183Updated last week
- ☆10Updated last week
- Network analysis tool for Attack Defence CTF☆326Updated 11 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆699Updated 3 weeks ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆623Updated 2 years ago
- Firegex, a firewall for Attack-Defense CTFs☆60Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆315Updated this week
- An Intrusion Prevention System for Attack-Defense CTFs☆45Updated 11 months ago
- List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general☆19Updated 3 years ago
- RSArmageddon☆27Updated last year
- Time for CTF(d) as Code☆15Updated last week
- Galah: An LLM-powered web honeypot.☆552Updated last month
- Automated decoding of encrypted text without knowing the key or ciphers used☆741Updated last week
- ☆416Updated 2 years ago
- A Retro Styled CTFd Theme☆150Updated 2 years ago
- Steganalysis web platform☆633Updated last week
- Risorse esame Prog. avanzata - Prof. E. Blanzieri e P. Roberti - Università di Trento☆20Updated 3 years ago
- A rewrite of YARA in Rust.☆806Updated this week
- Helm Charts for Dependency-Track☆41Updated 2 weeks ago
- Frontend UI for Dependency-Track☆126Updated this week
- Software for the Tablut Students Competition☆25Updated last year
- ☆12Updated last year
- A modular vulnerability scanner with automatic report generation capabilities.☆669Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆212Updated this week
- ☆293Updated 10 months ago
- Falco rule repository☆126Updated this week
- Volatility3 Linux profiles☆48Updated this week