enisaeu / ecsc-gameboardLinks
European Cyber Security Challenge Gameboard
☆28Updated 3 years ago
Alternatives and similar repositories for ecsc-gameboard
Users that are interested in ecsc-gameboard are comparing it to the libraries listed below
Sorting:
- Where CTFs happen☆81Updated last year
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- ☆20Updated 3 years ago
- Phoenix☆46Updated 6 years ago
- TCP flow analyzer with sugar for A/D CTF☆140Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- RSHack - Tool for RSA CTF's challenges☆96Updated 6 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆77Updated 6 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- ☆36Updated 6 years ago
- FAUST Gameserver for attack-defense CTFs☆75Updated 6 months ago
- notes and code on past CTFs☆103Updated 4 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆102Updated last year
- ☆49Updated 4 years ago
- A/D CTF services developed for ECSC 2022☆12Updated 2 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- ☆26Updated 3 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year