google / kctfLinks
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
☆700Updated last month
Alternatives and similar repositories for kctf
Users that are interested in kctf are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆191Updated 2 months ago
- Perfect Blue's CTF Writeups☆683Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆567Updated last month
- Writeups for the challenges from DownUnderCTF 2021☆175Updated 2 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- redpwn's CTF platform☆273Updated 5 months ago
- Infrastructure powering the pwn.college dojo☆373Updated last week
- TCP flow analyzer with sugar for A/D CTF☆142Updated 2 years ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆624Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆215Updated last year
- CVE-2022-0185☆371Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.☆809Updated last week
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆492Updated 7 months ago
- My write-ups from various CTFs☆118Updated last year
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆218Updated 2 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆324Updated 3 years ago
- pwninit - automate starting binary exploit challenges☆954Updated 11 months ago
- Files + Writeups for DownUnderCTF 2020 Challenges☆168Updated 3 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆461Updated last year
- ☆455Updated last month
- Example pwnable challenge hosted with docker☆224Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆657Updated last month
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆785Updated 7 months ago
- knowledge is power☆218Updated last month
- Proof of concept code for Datadog Security Labs referenced exploits.☆441Updated 3 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆698Updated 8 months ago
- Network analysis tool for Attack Defence CTF☆328Updated 2 weeks ago
- A container analysis and exploitation tool for pentesters and engineers.☆666Updated last year
- Source code for the 2022 DEF CON Qualifiers.☆265Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆682Updated 10 months ago