A Blockchain And Smart Contract Based CTF
☆17Jul 25, 2023Updated 2 years ago
Alternatives and similar repositories for Smart-Contract-CTF
Users that are interested in Smart-Contract-CTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A quick-and-easy web CTF platform for people who love ASCII and minimalism.☆14Jun 20, 2021Updated 4 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- A series of Linux and Windows based Forensics labs. Tools used include: FTK, EnCase, Sleuthkit, Autopsy, Volatility, etc.☆14Sep 17, 2020Updated 5 years ago
- Pakistan Cyber Security Challenge - 2023 CTF☆15Aug 14, 2025Updated 7 months ago
- DLT-Security-Framework☆17Feb 26, 2026Updated 3 weeks ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- ☆12Sep 19, 2022Updated 3 years ago
- CTF challenges I've written☆36Apr 20, 2023Updated 2 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- Activities by RE:UN10N members☆24Mar 7, 2026Updated 2 weeks ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Apr 23, 2019Updated 6 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- LEKIR - Vulnerable by design to help people learn about common web security☆30Mar 9, 2026Updated 2 weeks ago
- ☆11May 13, 2024Updated last year
- FluxN0de☆15Feb 22, 2022Updated 4 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Nov 27, 2018Updated 7 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- ☆11Nov 13, 2020Updated 5 years ago
- Embed binary into golang binary☆10Oct 5, 2016Updated 9 years ago
- Always up-to-date Headless Chrome Stable from the official Google Chrome PPA in a Docker image☆17Sep 13, 2021Updated 4 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Ethereum Node Record (ENR) rust implementation☆14Aug 4, 2022Updated 3 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- A tool to launch a quorum cluster in AWS leveraging Hashicorp software.☆13Jan 29, 2020Updated 6 years ago
- Collect public CTF source code repo☆48Sep 26, 2021Updated 4 years ago
- Ansible playbook to install cuckoo sandbox.☆11Mar 8, 2019Updated 7 years ago
- ☆13Apr 12, 2023Updated 2 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated 3 weeks ago
- ☆12Dec 1, 2013Updated 12 years ago