google / kctf
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
☆680Updated this week
Alternatives and similar repositories for kctf:
Users that are interested in kctf are comparing it to the libraries listed below
- Perfect Blue's CTF Writeups☆672Updated 9 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆184Updated 3 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆452Updated 9 months ago
- redpwn's CTF platform☆268Updated last month
- Repository for information about 0-days exploited in-the-wild.☆781Updated last week
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆540Updated this week
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 10 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆193Updated 8 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆213Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆688Updated 5 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆817Updated 4 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 2 years ago
- An updated collection of resources targeting browser-exploitation.☆814Updated 4 years ago
- pwninit - automate starting binary exploit challenges☆921Updated 7 months ago
- kernel-pwn and writeup collection☆600Updated last year
- CVE-2022-0185☆368Updated 2 years ago
- Example pwnable challenge hosted with docker☆219Updated last year
- My write-ups from various CTFs☆118Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆508Updated 9 months ago
- ☆441Updated 7 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆81Updated last year
- Simple DNS Rebinding Service☆650Updated 5 years ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆608Updated 2 years ago
- Resources related to GitHub Security Lab☆1,457Updated 2 months ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆304Updated 2 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆531Updated 3 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆663Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆430Updated this week
- repository for kernel exploit practice☆396Updated 5 years ago