The challenge toolbox is a small component which allows you to create, run and check new challenges locally.
☆27Mar 11, 2024Updated 2 years ago
Alternatives and similar repositories for challenge-toolbox
Users that are interested in challenge-toolbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Nov 4, 2021Updated 4 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Apr 17, 2026Updated 2 weeks ago
- ☆19Mar 23, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- My thoughts from going through the OSEP materials.☆20Jan 8, 2021Updated 5 years ago
- OpenSSH <=6.6 SFTP misconfiguration universal exploit☆27Mar 20, 2018Updated 8 years ago
- a shared short domain for XSS and other hacks☆32Mar 3, 2022Updated 4 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- My *nix dotfiles☆12Apr 16, 2026Updated 2 weeks ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- ☆11Feb 11, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- ☆13Mar 2, 2018Updated 8 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated 2 months ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- ☆16Updated this week
- Creates secured box for accessing internal networks☆15Apr 5, 2019Updated 7 years ago
- Evil Portal infusion for the wifi pineapple☆17May 13, 2018Updated 7 years ago
- Checkmarx Python SDK☆30Apr 10, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Apr 30, 2015Updated 11 years ago
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated last year
- A library to convert between Sigstore Bundles and PEP 740 Attestation objects☆15Apr 27, 2026Updated last week
- verinice.veo is a cloud-native application for managing information security and data protection☆23Apr 28, 2026Updated last week
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ☆100Mar 9, 2021Updated 5 years ago
- ☆10Apr 11, 2020Updated 6 years ago
- A tail(1)-like utility for nginx log files that supports parsing, filtering and formatting individual log lines.☆39Mar 14, 2014Updated 12 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Aug 28, 2020Updated 5 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 months ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Updated this week
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Marking instances dirty since 2018☆47Apr 25, 2019Updated 7 years ago
- An experimental cryptographic virtual machine☆14Feb 15, 2017Updated 9 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago