ctfer-io / chall-managerLinks
Challenge Instances on Demand, anywhere at any time
☆19Updated this week
Alternatives and similar repositories for chall-manager
Users that are interested in chall-manager are comparing it to the libraries listed below
Sorting:
- Breizh CTF 2024 - Challenges☆14Updated last year
- BreizhCTF 2023 - Challenges☆27Updated 2 years ago
- ☆40Updated 4 months ago
- ☆151Updated 3 months ago
- ☆67Updated 6 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 7 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆262Updated 8 months ago
- Web interface to explore Suricata EVE outputs☆65Updated this week
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 3 months ago
- ☆143Updated 2 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆52Updated last year
- Collection of steganography tools for images and text☆40Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆27Updated 10 months ago
- Compile SharpHound and others on Linux☆24Updated 11 months ago
- ☆64Updated last year
- Python3 utility for creating zip files that smuggle additional data for later extraction☆251Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated 3 months ago
- Docker images of the Exegol project☆111Updated last week
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 4 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆59Updated last month
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆44Updated last year
- Lab used for workshop and CTF☆259Updated 2 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- Artifact monitoring that ensures fairplay☆77Updated 6 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- A tool to transform Chromium browsers into a C2 Implant☆130Updated last week
- Obfuscate the bytes of your payload with an association dictionary☆68Updated 2 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆91Updated last year