ecavicc / flagWarehouse
Flag submission system for Attack/Defense CTFs
☆11Updated 3 years ago
Alternatives and similar repositories for flagWarehouse:
Users that are interested in flagWarehouse are comparing it to the libraries listed below
- An Intrusion Prevention System for Attack-Defense CTFs☆41Updated 7 months ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- A curated list of argument injection vectors☆40Updated last month
- Where CTFs happen☆81Updated 9 months ago
- Exploit distribution system for A&D competitions☆42Updated 3 months ago
- Security feed, done in the stupid simple way☆25Updated 2 months ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 3 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Discord webhook plugin for CTFd☆34Updated 7 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- CTF writeups maintained by TeamShakti members.☆25Updated 11 months ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 9 months ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Malware Analysis Tools☆29Updated 5 years ago
- Collection of our CTF write-ups☆29Updated 4 years ago
- ☆36Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆42Updated last year
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆22Updated last year
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆16Updated 3 years ago
- ☆17Updated 2 months ago
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆19Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- PowerShell alternative/restriction bypass☆12Updated 3 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- UFSIT scripts and tools for hardening and auditing☆13Updated this week
- CVE's we discovered along the way☆16Updated 3 years ago
- ☆45Updated last year