akama / NightShadeView external linksLinks
A simple capture the flag framework.
☆125May 28, 2017Updated 8 years ago
Alternatives and similar repositories for NightShade
Users that are interested in NightShade are comparing it to the libraries listed below
Sorting:
- ☆51Sep 23, 2017Updated 8 years ago
- Mellivora is a CTF engine written in PHP☆454Dec 21, 2023Updated 2 years ago
- Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!☆72Mar 8, 2023Updated 2 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆83Feb 16, 2023Updated 3 years ago
- A CTF framework to create, build, deploy and monitor challenges☆118Aug 19, 2025Updated 5 months ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- A Game platform to spread awareness among school and university students about various cyber attacks.☆15Oct 21, 2018Updated 7 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- A platform for jeopardy CTF (capture-the-flag) competitions written in Django.☆14Mar 12, 2019Updated 6 years ago
- Platform for hosting CTFs. Node.js is the only real dev language.☆24Dec 19, 2014Updated 11 years ago
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,084Jul 22, 2025Updated 6 months ago
- Yet another CTF platform☆148Nov 29, 2017Updated 8 years ago
- Scoreboard for Capture The Flag competitions.☆173Jun 4, 2022Updated 3 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- WackoPicko is a vulnerable web application used to test web application vulnerability scanners.☆344May 25, 2024Updated last year
- Scoring Engine for CTF competitions☆48Feb 15, 2023Updated 3 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- The iCTF Framework, presented by Shellphish!☆336Feb 15, 2023Updated 3 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Apr 15, 2019Updated 6 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Bamboofox CTF training platform☆22Jan 19, 2023Updated 3 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- A collection of web pages, vulnerable to command injection flaws☆180Mar 5, 2023Updated 2 years ago
- A modern vulnerable web app☆1,018Mar 11, 2021Updated 4 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- CTFs as you need them☆6,516Updated this week
- Create randomly insecure VMs☆2,746Feb 8, 2026Updated last week