facebookarchive / fbctfLinks
Platform to host Capture the Flag competitions
☆6,571Updated 2 years ago
Alternatives and similar repositories for fbctf
Users that are interested in fbctf are comparing it to the libraries listed below
Sorting:
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,899Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,494Updated 7 years ago
- CTFs as you need them☆6,492Updated last week
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,003Updated 3 years ago
- XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.☆1,745Updated 5 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,631Updated 7 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,835Updated 3 years ago
- Create randomly insecure VMs☆2,736Updated last month
- Wiki-like CTF write-ups repository, maintained by the community. 2014☆1,855Updated 9 years ago
- Web framework that allows performing periodic syncs of data sources and performing analysis on the identified results☆2,645Updated 6 years ago
- Gryffin is a large scale web security scanning platform.☆2,064Updated 4 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,026Updated last month
- Wiki-like CTF write-ups repository, maintained by the community. 2017☆2,148Updated 7 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,491Updated 4 years ago
- An advanced memory forensics framework☆7,955Updated 8 months ago
- A collected list of awesome security talks☆4,191Updated 4 years ago
- Dshell is a network forensic analysis framework.☆5,488Updated last year
- Various public documents, whitepapers and articles about APT campaigns☆3,643Updated 2 years ago
- Some setup scripts for security research tools.☆9,267Updated last week
- Course materials for Modern Binary Exploitation by RPISEC☆5,909Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,227Updated 6 years ago
- CTF Field Guide☆1,409Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,820Updated 5 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,895Updated 5 years ago
- Dirty COW☆3,428Updated 6 years ago
- Course materials for Malware Analysis by RPISEC☆3,986Updated 3 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,790Updated 2 years ago
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,332Updated 6 years ago
- Advanced CPU-based password recovery utility☆2,256Updated 3 years ago
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,848Updated 2 years ago