ctfer-io / terraform-provider-ctfdLinks
Time for CTF(d) as Code
☆18Updated this week
Alternatives and similar repositories for terraform-provider-ctfd
Users that are interested in terraform-provider-ctfd are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆198Updated 2 weeks ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆425Updated last week
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆220Updated 5 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆154Updated 10 months ago
- A Helm chart to deploy CTFd HA/Autoscaling + Redis + MariaDB + MinIO☆19Updated 5 months ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- Outil de sécurité des architectures kubernetes avancées☆56Updated 3 months ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆689Updated 4 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆303Updated last month
- This repository contains the container image scanning tool ORCA☆41Updated 3 weeks ago
- Breizh CTF 2024 - Challenges☆14Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated 2 years ago
- Kubernetes exploitation tool☆363Updated last year
- ☆314Updated 2 months ago
- Network analysis tool for Attack Defence CTF☆370Updated 2 months ago
- Runs exploits, fast.☆92Updated last year
- BreizhCTF 2023 - Challenges☆27Updated 2 years ago
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Updated 10 months ago
- A tool that recovers the public key used to sign JWT tokens☆123Updated 2 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆465Updated last year
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆139Updated 5 months ago
- Challenge infrastructure used for the DownUnderCTF competition☆24Updated 2 weeks ago
- ☆49Updated 11 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆48Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆188Updated last week
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆58Updated 3 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆708Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 7 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆292Updated 3 weeks ago
- Validate the isolation posture of your container environment.☆299Updated last month