Asynchronous exploit farm for attack-defence CTF
☆22Nov 8, 2018Updated 7 years ago
Alternatives and similar repositories for ctf-exploit-farm
Users that are interested in ctf-exploit-farm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The utility for CTF hacker competition for team hacking and flag submitting☆43Dec 5, 2017Updated 8 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 5 years ago
- Developed with ♥ by Hackerdom team☆23Apr 26, 2023Updated 2 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆350May 24, 2022Updated 3 years ago
- Highlighting different firefox containers in Burp Proxy☆12Dec 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Aug 7, 2021Updated 4 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Tasks from CTFZone 2017 quals☆12Jul 19, 2017Updated 8 years ago
- Large public A&D training on 2018-11-04☆24Jun 1, 2021Updated 4 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 7 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Jun 8, 2025Updated 10 months ago
- Burp Suite plugin for binary search on HTTP parameters☆17Oct 31, 2017Updated 8 years ago
- Multi-arch Docker images for Idris 2☆13Apr 7, 2026Updated last week
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- exerl☆16Feb 12, 2025Updated last year
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- The Wadler/Leijen Pretty Printer for colored ANSI terminal output☆31Sep 6, 2019Updated 6 years ago
- A language-generic implementation of equality saturation in Haskell☆22Dec 4, 2018Updated 7 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Docker container for use with Multi-layer Recurrent Neural Networks (LSTM, GRU, RNN) for character-level language models in Torch☆10Jan 19, 2019Updated 7 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 3 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- i3lock fork with option to execute script on failed authorization (unmaintained)☆11Jul 26, 2019Updated 6 years ago
- Configuration to use gpg smartcards for ssh authentication☆17Nov 22, 2020Updated 5 years ago
- Show Files from a Directory on the Desktop for wlroots based Compositors☆15Oct 4, 2025Updated 6 months ago
- The checkm8 port for Arduino and USB Host Shield☆131Feb 11, 2022Updated 4 years ago
- A throughput benchmarking tool for network topologies☆11Nov 22, 2016Updated 9 years ago
- ☆16Apr 14, 2020Updated 6 years ago
- GDB macros for real mode debugging☆25Apr 12, 2016Updated 10 years ago
- Course materials for Chalmers TPIL25 class☆15Feb 13, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- WIP MTProto implementation in Rust☆18Jan 5, 2019Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Fawkes-Crypto - zkSNARKs framework☆21Feb 6, 2024Updated 2 years ago
- Open addressing hash table on C++☆13Jan 19, 2015Updated 11 years ago
- presentations given by CU Cyber☆14Aug 23, 2020Updated 5 years ago
- Colorize terminal output☆13Nov 21, 2025Updated 4 months ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago