eciavatta / caronteLinks
A tool to analyze the network flow during attack/defence Capture the Flag competitions
☆635Updated 3 years ago
Alternatives and similar repositories for caronte
Users that are interested in caronte are comparing it to the libraries listed below
Sorting:
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆590Updated 2 weeks ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆344Updated 3 years ago
- Network analysis tool for Attack Defence CTF☆410Updated 3 months ago
- TCP flow analyzer with sugar for A/D CTF☆142Updated 3 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆201Updated 2 weeks ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆115Updated 4 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆743Updated 4 months ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆174Updated 2 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆86Updated 2 years ago
- Files + Writeups for DownUnderCTF 2020 Challenges☆167Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆108Updated 8 months ago
- Repository for information about 0-days exploited in-the-wild.☆850Updated 3 weeks ago
- Perfect Blue's CTF Writeups☆694Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆855Updated 3 months ago
- knowledge is power☆229Updated 3 weeks ago
- A curated list of awesome privilege escalation☆1,504Updated 5 months ago
- Chepy is a python lib/cli equivalent of the awesome CyberChef tool.☆1,026Updated 3 weeks ago
- Yet another Stego Tool☆400Updated 2 years ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆140Updated 3 years ago
- Writeups for the challenges from DownUnderCTF 2021☆180Updated 3 years ago
- pwninit - automate starting binary exploit challenges☆1,053Updated last month
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Updated 2 years ago
- CTF writeups from The Flat Network Society☆154Updated 6 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆920Updated last year
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,823Updated 4 years ago
- A collection of pwn/CTF related utilities for Ghidra☆701Updated last year
- 💻 CTF Heaven☆283Updated 9 months ago
- Steganalysis web platform☆766Updated last week
- ☆178Updated 3 years ago
- PoC exploits for software vulnerabilities☆687Updated 4 years ago