blackhillsinfosec / AI-CTFView external linksLinks
โ29Oct 29, 2025Updated 3 months ago
Alternatives and similar repositories for AI-CTF
Users that are interested in AI-CTF are comparing it to the libraries listed below
Sorting:
- Guides, Courses, Writeups and Tools That May Be Useful for CTFsโ24Jan 8, 2021Updated 5 years ago
- Sporta is a dynamic app designed for sports enthusiasts who want to connect ๐ค, compete ๐, and play ๐๐พโฝ with others.โ11Apr 24, 2025Updated 9 months ago
- This contains 100 days of the notes which i have learned with the internship.โ17Dec 1, 2024Updated last year
- Opensource repository for DVID V2โ16Jun 3, 2025Updated 8 months ago
- โ11Oct 13, 2025Updated 4 months ago
- A low-cost remote vital signs monitor for home patientsโ12Sep 21, 2020Updated 5 years ago
- Course material for University of Texas, Computer Science Department course CS 361 - Introduction to Computer Securityโ11Nov 17, 2015Updated 10 years ago
- cPanel Account Information Scriptโ12Jan 12, 2018Updated 8 years ago
- My mpv.net configuration filesโ12Jul 10, 2022Updated 3 years ago
- Uses jekyll, webpack, react, jekyll-livereload, and multithreaded rake tasksโ10Nov 7, 2019Updated 6 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CKยฎ into your organizationโs existing threat modeling methodology.โ12May 28, 2025Updated 8 months ago
- โ10May 30, 2015Updated 10 years ago
- hackasat-qualifier-2023-techpapersโ11Jul 17, 2023Updated 2 years ago
- xss_terminate is a plugin in that makes stripping and sanitizing HTML stupid-simple. Install and forget. And forget about forgetting to hโฆโ108May 30, 2010Updated 15 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.โ16Dec 10, 2019Updated 6 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.โ12Feb 4, 2022Updated 4 years ago
- Component Sprints: Development of a Novel Approach to Optimize the Transition from Prototype to MVPโ12Jun 22, 2022Updated 3 years ago
- โ27Updated this week
- Steganography Detection Frameworkโ13Jan 8, 2025Updated last year
- CVE-2022-22978 Spring-Security bypass Demoโ16Jun 2, 2022Updated 3 years ago
- Manage variables effectively when playing CTFsโ10Jul 26, 2025Updated 6 months ago
- โ14Dec 22, 2015Updated 10 years ago
- AI artifacts to improve Claude, Cursor, etc's knowledge of ShadowTraffic.โ20Updated this week
- PoC that downloads an executable from public DNS serversโ20Jul 19, 2025Updated 6 months ago
- LaTeX package for fixing margin notesโ20Nov 27, 2025Updated 2 months ago
- Historical analysis of statistics from football's modern era (1990s onwards) using FBRef dataโ13Oct 11, 2024Updated last year
- Wireless Network Security Analysis Toolโ16Apr 27, 2025Updated 9 months ago
- Dockerfile for Mroongaโ13Feb 6, 2026Updated last week
- A demo docker image for common privilege escalation techniques in *nix systemsโ10Oct 5, 2025Updated 4 months ago
- A collection of wordlists to use with privilege escalation and password cracking tasksโ14Feb 13, 2024Updated 2 years ago
- Notes I make for anything related to security.โ13Nov 3, 2022Updated 3 years ago
- A real-time web application for patient monitoring using ReactJS, NodeJS, ExpressJS, MongoDB, and Raspberry Pi.โ19May 3, 2023Updated 2 years ago
- Tools to make life easier ^_^โ13Aug 21, 2025Updated 5 months ago
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurityโ17Dec 11, 2021Updated 4 years ago
- basic C programs for intro to x86 reverse engineeringโ15Oct 5, 2018Updated 7 years ago
- Embeded Toolchains in opensource wayโ17Mar 22, 2023Updated 2 years ago
- Dockerized Chrome Browserโ15Dec 8, 2016Updated 9 years ago
- โ12Dec 8, 2016Updated 9 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesโฆโ16Jun 12, 2022Updated 3 years ago