akama / NightShadeLinks
A simple capture the flag framework.
☆125Updated 8 years ago
Alternatives and similar repositories for NightShade
Users that are interested in NightShade are comparing it to the libraries listed below
Sorting:
- Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!☆72Updated 2 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆83Updated 2 years ago
- 🏴 Collection of CTF solutions☆74Updated 6 years ago
- Some exploits and exploit development stuff.☆152Updated 3 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Updated 2 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Scoreboard for Capture The Flag competitions.☆171Updated 3 years ago
- Walkthrough some CTFs☆51Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- unix wildcard attacks☆136Updated 7 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- Linux pentest tools☆88Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106Updated 8 years ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- A CTF framework to create, build, deploy and monitor challenges☆117Updated 4 months ago
- Hacking challenges☆31Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Updated 5 years ago
- Yet another CTF platform☆148Updated 8 years ago
- Penetration testing scripts☆145Updated 7 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆177Updated 4 months ago
- ☆122Updated 7 years ago