enowars / bambictfLinks
Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud
☆17Updated last week
Alternatives and similar repositories for bambictf
Users that are interested in bambictf are comparing it to the libraries listed below
Sorting:
- TCP flow analyzer with sugar for A/D CTF☆143Updated 2 years ago
- FAUST Gameserver for attack-defense CTFs☆91Updated 3 weeks ago
- Runs exploits, fast.☆92Updated last year
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆334Updated 3 years ago
- Network analysis tool for Attack Defence CTF☆369Updated 2 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆198Updated last week
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆48Updated last year
- knowledge is power☆227Updated last month
- Many-Time Pad Interactive☆175Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆45Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆581Updated last month
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆85Updated 2 years ago
- Forge your own CTF☆46Updated 4 years ago
- ☆171Updated 3 years ago
- ☆14Updated 2 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆226Updated last year
- A multi-tenant network sandbox for security challenges☆80Updated 9 months ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- A full English version of the popular ctf-wiki☆100Updated last year
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 3 years ago
- Infrastructure powering the pwn.college dojo☆385Updated this week
- Example pwnable challenge hosted with docker☆227Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆690Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Updated 5 years ago
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆28Updated last year
- A Python library to debug binary executables, your own way.☆261Updated this week
- ☆42Updated last year
- Firegex, a firewall for Attack-Defense CTFs☆76Updated last week