eciavatta / caronteLinks
A tool to analyze the network flow during attack/defence Capture the Flag competitions
☆624Updated 2 years ago
Alternatives and similar repositories for caronte
Users that are interested in caronte are comparing it to the libraries listed below
Sorting:
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆572Updated last week
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆329Updated 3 years ago
- TCP flow analyzer with sugar for A/D CTF☆142Updated 2 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆108Updated 4 years ago
- Network analysis tool for Attack Defence CTF☆346Updated last month
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆168Updated last year
- ctfcli is a tool to manage Capture The Flag events and challenges☆195Updated 3 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆705Updated 2 months ago
- pwninit - automate starting binary exploit challenges☆962Updated last year
- Yet another Stego Tool☆389Updated 2 years ago
- PoC exploits for software vulnerabilities☆680Updated 3 years ago
- knowledge is power☆224Updated this week
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆908Updated last year
- Challenge source code, handout scripts and writeups of InCTF International Edition☆155Updated last year
- PoC for CVE-2021-3156 (sudo heap overflow)☆437Updated 3 years ago
- A collection of pwn/CTF related utilities for Ghidra☆688Updated 11 months ago
- Repository for information about 0-days exploited in-the-wild.☆822Updated last month
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆138Updated 3 years ago
- A curated list of awesome privilege escalation☆1,388Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,135Updated last year
- Writeups for the challenges from DownUnderCTF 2021☆175Updated 2 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆854Updated 3 months ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- FAUST Gameserver for attack-defense CTFs☆82Updated 3 weeks ago
- Files + Writeups for DownUnderCTF 2020 Challenges☆168Updated 3 years ago
- 💻 CTF Heaven☆274Updated 4 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆425Updated 3 years ago
- Reverse shell generator written in Python 3.☆530Updated this week
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆795Updated 7 months ago