European Cyber Security Challenge Gameboard
☆29Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for ecsc-gameboard
Users that are interested in ecsc-gameboard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated 2 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- https://oopquiz.fly.dev☆10Oct 31, 2023Updated 2 years ago
- A/D CTF services developed for ECSC 2022☆13Nov 11, 2022Updated 3 years ago
- ☆10Nov 21, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Extendable Visualization & Exploitation tool for glibc heap☆75May 5, 2025Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Optimizers for/and sklearn compatible Machine Learning models☆10Mar 4, 2023Updated 3 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- Notes from the Computational Mathematics course held by professor Antonio Frangioni and professor Federico Poloni at University of Pisa☆12Aug 28, 2021Updated 4 years ago
- A handy CLI tool for bulk-sending emails☆17Mar 6, 2025Updated last year
- We are a Swiss Capture The Flag team. We participate in CTFs and publish write-ups on CTF tasks.☆10Mar 25, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Towards Machine-Checked Analysis of Browser Security Mechanisms☆12Jun 17, 2024Updated last year
- Python tool for decrypting vim encrypted files.☆51Jul 31, 2025Updated 9 months ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- ☆12Sep 19, 2023Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- implementation of some algorithms seen during the Algorithm Engineer course @ UniPi☆19Jan 29, 2019Updated 7 years ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 9 months ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆20Sep 10, 2025Updated 8 months ago
- ☆20Jun 1, 2024Updated last year
- A collection of libraries and tools to create programming challenges and competitions☆15Mar 3, 2023Updated 3 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆592May 9, 2026Updated last week
- A small Coq library for collecting side conditions and deferring their proof☆26Oct 14, 2019Updated 6 years ago
- Service provider di base con autenticazione SPID☆24Apr 4, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A web application that builds a social coding platform upon CMS☆22May 12, 2026Updated last week
- ☆17Jan 29, 2020Updated 6 years ago
- A framework for the detection of COSI vulnerabilities / XS-Leaks☆14Mar 29, 2023Updated 3 years ago
- Language-independent Synthesis of Firewall Policies☆26Jan 6, 2023Updated 3 years ago
- Force `go get` to make shallow clone and pulls☆11May 3, 2018Updated 8 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆15Feb 14, 2017Updated 9 years ago
- Gendered Ambiguous Pronouns Shared Task☆31Nov 21, 2022Updated 3 years ago