google / kctf
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
☆674Updated 4 months ago
Alternatives and similar repositories for kctf:
Users that are interested in kctf are comparing it to the libraries listed below
- ctfcli is a tool to manage Capture The Flag events and challenges☆177Updated last month
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆184Updated 6 months ago
- Perfect Blue's CTF Writeups☆673Updated 7 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆528Updated this week
- Infrastructure powering the pwn.college dojo☆324Updated this week
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆80Updated last year
- My write-ups from various CTFs☆115Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆684Updated 3 months ago
- pwninit - automate starting binary exploit challenges☆897Updated 5 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year
- redpwn's CTF platform☆268Updated 5 months ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆602Updated 2 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆601Updated 6 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆444Updated 7 months ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 8 months ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆298Updated 2 years ago
- kernel-pwn and writeup collection☆584Updated last year
- Repository for information about 0-days exploited in-the-wild.☆770Updated 3 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆420Updated last year
- Network analysis tool for Attack Defence CTF☆292Updated 6 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆341Updated last year
- A container analysis and exploitation tool for pentesters and engineers.☆655Updated last year
- ☆433Updated 5 months ago
- Writeups for the challenges from DownUnderCTF 2021☆173Updated 2 years ago
- Example pwnable challenge hosted with docker☆216Updated 11 months ago
- PAWNYABLE!☆203Updated 8 months ago
- TCP flow analyzer with sugar for A/D CTF☆138Updated 2 years ago
- Files + Writeups for DownUnderCTF 2022 Challenges☆253Updated 2 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆813Updated 4 years ago
- Provide powerful tools for seccomp analysis☆1,002Updated this week