eciavatta / caronteLinks
A tool to analyze the network flow during attack/defence Capture the Flag competitions
☆629Updated 2 years ago
Alternatives and similar repositories for caronte
Users that are interested in caronte are comparing it to the libraries listed below
Sorting:
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆586Updated last month
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆343Updated 3 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆198Updated last month
- TCP flow analyzer with sugar for A/D CTF☆143Updated 2 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆111Updated 4 years ago
- Network analysis tool for Attack Defence CTF☆386Updated 3 weeks ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆173Updated last year
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆729Updated last month
- pwninit - automate starting binary exploit challenges☆1,015Updated last year
- Perfect Blue's CTF Writeups☆689Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆86Updated 2 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,143Updated 2 years ago
- A curated list of awesome privilege escalation☆1,453Updated 2 months ago
- PoC exploits for software vulnerabilities☆682Updated 4 years ago
- Yet another Stego Tool☆396Updated 2 years ago
- Writeups for the challenges from DownUnderCTF 2021☆179Updated 3 years ago
- 💻 CTF Heaven☆277Updated 7 months ago
- knowledge is power☆229Updated 2 months ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆138Updated 3 years ago
- Reverse shell generator written in Python 3.☆538Updated 2 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆830Updated 3 weeks ago
- Challenge source code, handout scripts and writeups of InCTF International Edition☆156Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,385Updated 3 weeks ago
- Repository for information about 0-days exploited in-the-wild.☆836Updated last month
- Files + Writeups for DownUnderCTF 2020 Challenges☆167Updated 4 years ago
- An aggregation of CTF challenges and write-ups for csictf 2020!☆55Updated 2 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆223Updated 2 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- FAUST Gameserver for attack-defense CTFs☆98Updated 2 weeks ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,784Updated 4 years ago