Flask platform for Capture The Flag challenges
☆53Feb 19, 2026Updated last week
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- A platform for running CTFs☆35May 28, 2016Updated 9 years ago
- Yet another CTF platform☆148Nov 29, 2017Updated 8 years ago
- Platform for hosting CTFs. Node.js is the only real dev language.☆24Dec 19, 2014Updated 11 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Laravel-Based Community CTF Platform☆17Feb 14, 2026Updated last week
- ☆28Oct 16, 2017Updated 8 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A tool help get the basic information of one site☆108Jan 14, 2019Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- GitLeak 是一个从 Github 上查找密码信息的小工具☆128May 15, 2018Updated 7 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- A Zhiyuan OA Collaborative Office Remote Code Execution Vulnerability on Windows☆37Jun 27, 2019Updated 6 years ago
- Domain parsing with Python☆44Mar 3, 2025Updated 11 months ago
- Writeups for different CTF challenges☆70Mar 25, 2025Updated 11 months ago
- CanHackMe - Jeopardy CTF Platform☆45Oct 27, 2023Updated 2 years ago
- sqliv modified by Ali0th☆14Dec 28, 2017Updated 8 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment)☆10Jun 13, 2017Updated 8 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Aug 26, 2019Updated 6 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- browser based dynamic fuzzer☆15Dec 8, 2022Updated 3 years ago
- 一个简单的CTF测试平台,做培训上用,目前没有做相关安全方面的策略,不要部署到线上☆14Aug 31, 2017Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Capture The Flag hacker contest daemon☆33Oct 21, 2017Updated 8 years ago
- 基于Python3的Web日志分析小工具☆12Nov 10, 2016Updated 9 years ago