avatao-content / challenge-toolboxView external linksLinks
The challenge toolbox is a small component which allows you to create, run and check new challenges locally.
☆27Mar 11, 2024Updated last year
Alternatives and similar repositories for challenge-toolbox
Users that are interested in challenge-toolbox are comparing it to the libraries listed below
Sorting:
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 5 months ago
- ☆19Mar 23, 2021Updated 4 years ago
- ☆16Feb 6, 2026Updated last week
- Compiler exploits and exploitable non-obvious source code back doors.☆48Nov 24, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- ☆12Aug 1, 2025Updated 6 months ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆33Dec 26, 2025Updated last month
- Query CSV files with SQL.☆11Oct 15, 2018Updated 7 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆20Feb 3, 2026Updated last week
- Parsec Go client☆12Oct 25, 2022Updated 3 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- These books are pulled from # List of Free Learning Resources [☆12Mar 2, 2022Updated 3 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- Proof of Concept - Local discharging of third party caveats☆14Nov 27, 2017Updated 8 years ago
- A simple demo of running a scheduled PHP process on Heroku☆18Feb 8, 2024Updated 2 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- x86 Microkernel☆15Apr 1, 2020Updated 5 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago