A tool to analyze the network flow during attack/defence Capture the Flag competitions
☆638Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for caronte
Users that are interested in caronte are comparing it to the libraries listed below
Sorting:
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆349May 24, 2022Updated 3 years ago
- Write-ups and Source-codes for CTF Challenges☆70Oct 29, 2024Updated last year
- Source code files and writeups of the 2018 CFI CTF's challenges.☆51Dec 12, 2018Updated 7 years ago
- Challenge source and solutions for InCTF junior (exclusively for Indian school students)☆33Sep 27, 2019Updated 6 years ago
- SQL injection challenge☆110Jan 19, 2017Updated 9 years ago
- Challenges source code☆67Jan 27, 2018Updated 8 years ago
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆77Oct 15, 2019Updated 6 years ago
- Network analysis tool for Attack Defence CTF☆425Oct 6, 2025Updated 5 months ago
- Python-based tool to dump security information from Windows systems☆280Jun 22, 2020Updated 5 years ago
- RSA primes numbers /RSA/CTFs☆84May 23, 2023Updated 2 years ago
- Cross-site scripting labs for web application security enthusiasts☆332Jun 2, 2021Updated 4 years ago
- Repository to index useful online tools for CTF☆174Feb 2, 2025Updated last year
- Challenge source code, handout script and writeups of InCTF National Edition☆95Oct 2, 2019Updated 6 years ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆178Dec 6, 2023Updated 2 years ago
- TCP flow analyzer with sugar for A/D CTF☆142Dec 8, 2022Updated 3 years ago
- Attack & Defense CTF Farm based on DestructiveFarm☆128Aug 8, 2025Updated 7 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆52Jul 19, 2024Updated last year
- CTF Challenges☆140Dec 17, 2024Updated last year
- This is a list of security tools that I have used or recommend. Welcome any contributions!☆383Feb 6, 2024Updated 2 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆119Updated this week
- Reverse shell generator written in Python 3.☆547Aug 6, 2025Updated 7 months ago
- Challenge source code, handout scripts and writeups of InCTF International Edition☆164Nov 26, 2023Updated 2 years ago
- Developed with ♥ by Hackerdom team☆23Apr 26, 2023Updated 2 years ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Runs exploits, fast.☆113Oct 11, 2025Updated 4 months ago
- swiss army knife for hackers☆544Jul 18, 2023Updated 2 years ago
- Open Source EDR for Windows☆1,297Feb 25, 2023Updated 3 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,446Oct 3, 2025Updated 5 months ago
- A Modern Orchestration Engine for Security☆6,116Mar 1, 2026Updated last week
- Automation for internal Windows Penetrationtest / AD-Security☆3,645Aug 28, 2025Updated 6 months ago
- A query aggregator for OSINT based threat hunting☆932Mar 2, 2026Updated last week
- Red Teaming Tactics and Techniques☆4,501Aug 22, 2024Updated last year
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- Threat Hunting tool about Sysmon and graphs☆337May 28, 2023Updated 2 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,250Jun 10, 2025Updated 8 months ago
- A curated list of awesome privilege escalation☆1,518Aug 20, 2025Updated 6 months ago
- Penetration testing utility and antivirus assessment tool.☆315Apr 25, 2023Updated 2 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago