A simulation of the RFCTF KOTH game.
☆10Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for koth_simulator
Users that are interested in koth_simulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Aug 11, 2024Updated last year
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- ☆20Oct 25, 2024Updated last year
- Random files such as wordlists which maybe be useful for playing our game☆24Aug 2, 2025Updated 9 months ago
- This will be a wiki when it grows up, if it grows up☆96Aug 11, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A WPA3 dictionary cracker☆358Jul 10, 2023Updated 2 years ago
- Python source code for generating manchester encoded binary files. Use with LRS pagers, GNU Radio and HackRF.☆45Jan 22, 2023Updated 3 years ago
- scripts that go in the rfctf container☆28Apr 24, 2026Updated last week
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- A web front-end providing a REST-ful API to mount and unmount forensic disk images☆22Feb 14, 2026Updated 2 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- ☆15Jan 21, 2020Updated 6 years ago
- ☆11Aug 13, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 3 months ago
- .sub files for the LED bracelets distributed at DEFCON☆17Jul 22, 2025Updated 9 months ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Hacking of the Disno Band Version 2 and its internal NRF31512☆25Jun 1, 2023Updated 2 years ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Encrypting IRC proxy☆16Feb 21, 2022Updated 4 years ago
- Custom Fedora Atomic Image for my Desktop and Laptop. This is my take on what the modern Linux Desktop should look like.☆22Oct 27, 2025Updated 6 months ago
- A concurrent toolkit to help execute funcs concurrently in an efficient and safe way. It supports specifying the overall timeout to avoid…☆17Jun 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- ☆16Nov 14, 2016Updated 9 years ago
- Future home of our DC28 badge☆15Oct 23, 2020Updated 5 years ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago
- ProxyWatch☆48Apr 25, 2026Updated last week
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- CurlWright is a Cloudflare bypass tool that leverages Playwright to execute curl commands with full browser capabilities, allowing you to…☆33Mar 9, 2026Updated last month
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 2 months ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- kerberos in rust for fun and profit☆73Mar 13, 2026Updated last month
- The Doom Superior Add On☆16Aug 4, 2019Updated 6 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- AI-based Ludus range configuration builder☆29May 6, 2025Updated last year