European Cyber Security Challenge Gameboard
☆29Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for ecsc-gameboard
Users that are interested in ecsc-gameboard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The C Macro☆37Feb 28, 2026Updated last month
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- Extendable Visualization & Exploitation tool for glibc heap☆74May 5, 2025Updated 10 months ago
- ☆15May 1, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Java library for Elliptic Curve Cryptography☆13Aug 20, 2018Updated 7 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Automatically format python interpreter results in hex☆30Sep 21, 2022Updated 3 years ago
- Optimizers for/and sklearn compatible Machine Learning models☆10Mar 4, 2023Updated 3 years ago
- A multiplayer game about killing processes on your computer! #warsztatywww☆12Aug 27, 2016Updated 9 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GDB cheatsheet for reversing binaries☆21Jan 25, 2019Updated 7 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- 💻 A cooperative hacking game, and an entry into GitHub's November 2016 game-off game jam☆19Oct 11, 2017Updated 8 years ago
- Notes from the Computational Mathematics course held by professor Antonio Frangioni and professor Federico Poloni at University of Pisa☆12Aug 28, 2021Updated 4 years ago
- A handy CLI tool for bulk-sending emails☆17Mar 6, 2025Updated last year
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- We are a Swiss Capture The Flag team. We participate in CTFs and publish write-ups on CTF tasks.☆10Mar 25, 2019Updated 7 years ago
- A pure Rust implementation of AES 128☆18Mar 24, 2020Updated 6 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- ☆12Sep 19, 2023Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 3 weeks ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- Place SSH users in Docker jails, or just use it as a replacement for docker-bash / dockersh.☆37Oct 7, 2014Updated 11 years ago
- implementation of some algorithms seen during the Algorithm Engineer course @ UniPi☆19Jan 29, 2019Updated 7 years ago
- Intelligent Cirno Experience, a video encoding/decoding suite for OpenComputers 1.6+☆16Apr 3, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of libraries and tools to create programming challenges and competitions☆15Mar 3, 2023Updated 3 years ago
- michalspacek.cz + michalspacek.com + subdomains source code because why not☆11Updated this week
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Aug 20, 2024Updated last year
- VCrypture is an online service that allows you to encrypt your secret images safely using visual cryptographic algorithms.☆21Aug 13, 2020Updated 5 years ago
- The repo for the mobile app of defikarte.ch☆13Feb 8, 2026Updated last month
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago