cybermouflons / ovisbotLinks
Discord bot focused on managing and organising CTFs / Security stuff
☆18Updated 7 months ago
Alternatives and similar repositories for ovisbot
Users that are interested in ovisbot are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Official training ground for the OTA CTF team☆39Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Where CTFs happen☆81Updated last year
- Pwn2Win CTF 2020 flag submissions☆29Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- ☆49Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- A Pwning Toolkit☆28Updated 5 months ago
- Reverse engineering challenges☆50Updated 5 years ago
- Automatic ROPChain Generation☆288Updated 5 years ago
- tools for shellcoding☆56Updated last year
- Scripts I used during CTP☆67Updated 4 years ago
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Updated 11 months ago
- Stego Helper Identification Tool☆27Updated 6 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33Updated 6 years ago
- ☆14Updated 6 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- ☆26Updated 3 years ago
- ☆20Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆195Updated 2 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago