adamyi / CTFProxyLinks
Your ultimate infrastructure to run a CTF, with a BeyondCorp-like zero-trust network and simple infrastructure-as-code configuration.
☆70Updated 3 years ago
Alternatives and similar repositories for CTFProxy
Users that are interested in CTFProxy are comparing it to the libraries listed below
Sorting:
- RSA Tool for CTF challenges in golang☆47Updated last month
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆220Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Updated 3 years ago
- Monorepo for infrastructure and challenges of SECedu CTF 2019.☆28Updated 5 years ago
- justCTF 2019 challenges sources☆41Updated 4 years ago
- ☆34Updated 3 years ago
- Discord bot focused on managing and organising CTFs / Security stuff☆18Updated last year
- CQ, a code security scanner☆99Updated last year
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Updated 3 years ago
- ☆116Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- CTFd Dump - When you want to have an offline copy of a CTF.☆52Updated 8 months ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆68Updated 7 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- the puppy proxy☆22Updated 5 years ago
- Where CTFs happen☆82Updated last year
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 3 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 3 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆141Updated last year
- ☆16Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago