adamyi / CTFProxyLinks
Your ultimate infrastructure to run a CTF, with a BeyondCorp-like zero-trust network and simple infrastructure-as-code configuration.
☆70Updated 2 years ago
Alternatives and similar repositories for CTFProxy
Users that are interested in CTFProxy are comparing it to the libraries listed below
Sorting:
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆219Updated 2 years ago
- Monorepo for infrastructure and challenges of SECedu CTF 2019.☆27Updated 5 years ago
- CQ, a code security scanner☆100Updated last year
- A curated list of argument injection vectors☆41Updated 10 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- A curated list of awesome browser security learning material.☆145Updated 3 years ago
- RSA Tool for CTF challenges in golang☆47Updated this week
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- ☆16Updated 2 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆111Updated 2 weeks ago
- ☆116Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- An example of a vulnerability in the early JWT token node.js library☆37Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 4 years ago
- ☆33Updated 2 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- Resources for Browser Security Research☆48Updated 3 years ago
- 🕶 Design fun and insightful CTF challenges☆70Updated 3 years ago
- ☆83Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Where CTFs happen☆82Updated last year
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- DEbian Cve REproducer Tool☆27Updated last week
- Automatically fuzz Rust projects from scratch☆58Updated 5 months ago