eciavatta / caronte
A tool to analyze the network flow during attack/defence Capture the Flag competitions
☆584Updated last year
Related projects: ⓘ
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆279Updated 2 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆517Updated this week
- TCP flow analyzer with sugar for A/D CTF☆138Updated last year
- Network analysis tool for Attack Defence CTF☆255Updated 2 months ago
- Yet another Stego Tool☆348Updated last year
- Challenge source code, handout scripts and writeups of InCTF International Edition☆149Updated 9 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆657Updated this week
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,106Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆85Updated 3 years ago
- Perfect Blue's CTF Writeups☆664Updated 2 months ago
- Everything needed for doing CTFs☆653Updated 10 months ago
- A curated list of awesome privilege escalation☆1,198Updated 3 months ago
- Reverse shell generator written in Python 3.☆504Updated 8 months ago
- Pwnable|Web Security|Cryptography CTF-style challenges☆405Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆314Updated last year
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆150Updated 9 months ago
- knowledge is power☆196Updated 5 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,176Updated 3 months ago
- Repository for information about 0-days exploited in-the-wild.☆752Updated 3 weeks ago
- CTF Cheatsheet☆40Updated 3 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆165Updated 2 weeks ago
- PoC exploits for software vulnerabilities☆676Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆812Updated 7 months ago
- Herramienta para evadir disable_functions y open_basedir☆387Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆79Updated last year
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year
- pwninit - automate starting binary exploit challenges☆847Updated last month
- PoC for CVE-2021-3156 (sudo heap overflow)☆430Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,184Updated 3 months ago