enowars / bambictfLinks
Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud
☆19Updated 3 months ago
Alternatives and similar repositories for bambictf
Users that are interested in bambictf are comparing it to the libraries listed below
Sorting:
- FAUST Gameserver for attack-defense CTFs☆99Updated 3 weeks ago
- Network analysis tool for Attack Defence CTF☆406Updated 2 months ago
- Runs exploits, fast.☆106Updated 2 months ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆343Updated 3 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆200Updated last month
- TCP flow analyzer with sugar for A/D CTF☆142Updated 3 years ago
- knowledge is power☆229Updated 4 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87Updated 2 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆589Updated 2 months ago
- ☆330Updated last year
- An Intrusion Prevention System for Attack-Defense CTFs☆51Updated last year
- ☆174Updated 3 years ago
- Damn Vulnerable IoT Device☆213Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆702Updated last year
- Many-Time Pad Interactive☆178Updated last year
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆174Updated 2 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆248Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆368Updated 8 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆755Updated last week
- A full English version of the popular ctf-wiki☆104Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 5 years ago
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆28Updated 2 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆711Updated last year
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- CTF writeups from The Flat Network Society☆150Updated 5 months ago
- 'Ike: A binary exploitation and reversing handbook.☆88Updated 3 months ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆114Updated 4 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆158Updated last year
- Infrastructure powering the pwn.college dojo☆414Updated this week