eciavatta / caronteView external linksLinks
A tool to analyze the network flow during attack/defence Capture the Flag competitions
☆637Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for caronte
Users that are interested in caronte are comparing it to the libraries listed below
Sorting:
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆347May 24, 2022Updated 3 years ago
- Write-ups and Source-codes for CTF Challenges☆69Oct 29, 2024Updated last year
- Source code files and writeups of the 2018 CFI CTF's challenges.☆51Dec 12, 2018Updated 7 years ago
- Challenge source and solutions for InCTF junior (exclusively for Indian school students)☆33Sep 27, 2019Updated 6 years ago
- SQL injection challenge☆109Jan 19, 2017Updated 9 years ago
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆76Oct 15, 2019Updated 6 years ago
- Challenges source code☆66Jan 27, 2018Updated 8 years ago
- Network analysis tool for Attack Defence CTF☆425Oct 6, 2025Updated 4 months ago
- Python-based tool to dump security information from Windows systems☆280Jun 22, 2020Updated 5 years ago
- Repository to index useful online tools for CTF☆173Feb 2, 2025Updated last year
- Cross-site scripting labs for web application security enthusiasts☆330Jun 2, 2021Updated 4 years ago
- RSA primes numbers /RSA/CTFs☆83May 23, 2023Updated 2 years ago
- Challenge source code, handout script and writeups of InCTF National Edition☆95Oct 2, 2019Updated 6 years ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆176Dec 6, 2023Updated 2 years ago
- TCP flow analyzer with sugar for A/D CTF☆142Dec 8, 2022Updated 3 years ago
- Attack & Defense CTF Farm based on DestructiveFarm☆127Aug 8, 2025Updated 6 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆52Jul 19, 2024Updated last year
- CTF Challenges☆139Dec 17, 2024Updated last year
- This is a list of security tools that I have used or recommend. Welcome any contributions!☆381Feb 6, 2024Updated 2 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆115Updated this week
- Reverse shell generator written in Python 3.☆544Aug 6, 2025Updated 6 months ago
- Challenge source code, handout scripts and writeups of InCTF International Edition☆163Nov 26, 2023Updated 2 years ago
- Developed with ♥ by Hackerdom team☆23Apr 26, 2023Updated 2 years ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Runs exploits, fast.☆114Oct 11, 2025Updated 4 months ago
- Open Source EDR for Windows☆1,292Feb 25, 2023Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,430Oct 3, 2025Updated 4 months ago
- swiss army knife for hackers☆543Jul 18, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,096Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,639Aug 28, 2025Updated 5 months ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated 3 weeks ago
- Red Teaming Tactics and Techniques☆4,487Aug 22, 2024Updated last year
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- Threat Hunting tool about Sysmon and graphs☆336May 28, 2023Updated 2 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,244Jun 10, 2025Updated 8 months ago
- A curated list of awesome privilege escalation☆1,510Aug 20, 2025Updated 5 months ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- Web CTF CheatSheet 🐈☆2,929Oct 28, 2025Updated 3 months ago