adamyi / CTFProxyLinks
Your ultimate infrastructure to run a CTF, with a BeyondCorp-like zero-trust network and simple infrastructure-as-code configuration.
☆70Updated 2 years ago
Alternatives and similar repositories for CTFProxy
Users that are interested in CTFProxy are comparing it to the libraries listed below
Sorting:
- Monorepo for infrastructure and challenges of SECedu CTF 2019.☆27Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- SQL injection via bruteforced MD5 hash reflection of random strings☆51Updated 6 years ago
- Where CTFs happen☆81Updated last year
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago
- ☆25Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- XS-Leak Browser Test Suite☆81Updated last year
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- ☆26Updated 3 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Stereotyped Challenges (2014~2023)☆85Updated 2 years ago
- Burp with Friends☆103Updated 2 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆36Updated 2 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Updated 3 years ago
- Trail of Bits Testing Handbook☆76Updated 2 weeks ago
- the puppy proxy☆22Updated 5 years ago
- Stego Helper Identification Tool☆27Updated 6 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆62Updated this week
- Faraday's Command Line Interface☆50Updated 5 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- My CTF writeups☆26Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 6 months ago
- a repository of all the CTF challenges I've made for public events☆53Updated last week
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago