The challenge toolbox is a small component which allows you to create, run and check new challenges locally.
☆27Mar 11, 2024Updated 2 years ago
Alternatives and similar repositories for challenge-toolbox
Users that are interested in challenge-toolbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 7 months ago
- ☆19Mar 23, 2021Updated 5 years ago
- OpenSSH <=6.6 SFTP misconfiguration universal exploit☆27Mar 20, 2018Updated 8 years ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- This repository maintains some of the scripts made by Ebryx DevSecOps team.☆12Dec 21, 2022Updated 3 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- Administration application for the DreamFactory Platform☆13Apr 2, 2024Updated last year
- Evil Portal infusion for the wifi pineapple☆17May 13, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ☆10Apr 11, 2020Updated 5 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- A collection of scripts for setting up build machines and running builds☆16Feb 18, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Marking instances dirty since 2018☆47Apr 25, 2019Updated 6 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 7 years ago
- An experimental cryptographic virtual machine☆14Feb 15, 2017Updated 9 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- ☆11Feb 25, 2023Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- A proxy designed to lie.☆25Jan 26, 2013Updated 13 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Feb 14, 2025Updated last year
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆16Oct 9, 2023Updated 2 years ago
- Cheat Sheets☆12Feb 25, 2019Updated 7 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- ACT documentation repo☆18May 22, 2024Updated last year