The challenge toolbox is a small component which allows you to create, run and check new challenges locally.
☆27Mar 11, 2024Updated 2 years ago
Alternatives and similar repositories for challenge-toolbox
Users that are interested in challenge-toolbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- OpenSSH <=6.6 SFTP misconfiguration universal exploit☆27Mar 20, 2018Updated 8 years ago
- a shared short domain for XSS and other hacks☆32Mar 3, 2022Updated 4 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Dec 3, 2022Updated 3 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- ☆16Mar 29, 2026Updated 2 weeks ago
- Creates secured box for accessing internal networks☆15Apr 5, 2019Updated 7 years ago
- Unicode Security Guide☆120Oct 16, 2017Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- This repo hosts Terraform code for generating and analyzing Software Bill of Materials (SBOM) for Amazon ECR images. It helps identify Am…☆16Oct 18, 2023Updated 2 years ago
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 months ago
- A client for Hashicorp Vault written in TypeScript☆14Nov 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 7 years ago
- ☆11Feb 25, 2023Updated 3 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- A proxy designed to lie.☆25Jan 26, 2013Updated 13 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆70Jun 25, 2025Updated 9 months ago
- Gungnir - Homelab Automation Tool to Guard your very own Asgard☆16Jan 26, 2026Updated 2 months ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Cheat Sheets☆12Feb 25, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- ☆10Feb 27, 2019Updated 7 years ago
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- ACT documentation repo☆17May 22, 2024Updated last year
- Exploitation challenges for CTF☆64Feb 13, 2018Updated 8 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Twitter strategy for Opauth☆36Jun 18, 2018Updated 7 years ago