Upcoming list of ctfs directly in your terminal!
☆16Apr 17, 2023Updated 2 years ago
Alternatives and similar repositories for ctfwatch
Users that are interested in ctfwatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tourist is an HTTP API around Microsoft Playwright for CTF challenges☆13Jun 25, 2025Updated 9 months ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆10May 27, 2024Updated last year
- RuCTF 2019. Developed with ♥ by Hackerdom team☆13Nov 28, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 🏗 Automatically generating builders 👷♂️for Kotlin data classes☆17Jun 17, 2020Updated 5 years ago
- ☆139Jan 14, 2022Updated 4 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 5 years ago
- Scudo useful files☆10Jul 3, 2022Updated 3 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆17Apr 1, 2021Updated 4 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- ☆15Jun 8, 2019Updated 6 years ago
- Little tool to fix golangs mime.TypeByExtension issue with js files on windows plattform☆13Feb 27, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆24May 23, 2025Updated 10 months ago
- ☆15Jul 10, 2025Updated 8 months ago
- Plugin to give CTFd the ability to manage Docker containers☆19Oct 10, 2017Updated 8 years ago
- ☆28Jan 17, 2026Updated 2 months ago
- A Web Platform API proposal for Blob URL☆10Feb 24, 2023Updated 3 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Free googleTranslate Translation tool package for Golang☆16Dec 4, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆165Dec 5, 2022Updated 3 years ago
- ☆23Mar 9, 2022Updated 4 years ago
- ☆177Jul 22, 2022Updated 3 years ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- PlanetSide 2 network emulation PoC☆13Apr 20, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Osmocom TTCN3 tests suites; mirrored from https://gitea.osmocom.org/ttcn3/osmo-ttcn3-hacks☆28Updated this week
- ☆12May 6, 2020Updated 5 years ago
- Toy approach to VMProtect virtualization☆16Oct 26, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Feb 27, 2026Updated last month
- Distributed fuzzing framework for AFL☆19Apr 12, 2016Updated 9 years ago
- A POC tricking the end user of a captcha to reveal his browser history☆87Mar 27, 2018Updated 8 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated 2 years ago
- Modification of LTE Firmwares on smartphones☆19Dec 31, 2020Updated 5 years ago