google / kctf
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
☆687Updated last month
Alternatives and similar repositories for kctf:
Users that are interested in kctf are comparing it to the libraries listed below
- Perfect Blue's CTF Writeups☆677Updated 10 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆188Updated this week
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆548Updated this week
- pwninit - automate starting binary exploit challenges☆931Updated 8 months ago
- redpwn's CTF platform☆272Updated 3 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆203Updated 9 months ago
- knowledge is power☆213Updated this week
- A container analysis and exploitation tool for pentesters and engineers.☆665Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆456Updated 10 months ago
- My write-ups from various CTFs☆118Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆81Updated last year
- ☆445Updated 8 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆216Updated 2 years ago
- Example pwnable challenge hosted with docker☆221Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.☆436Updated last month
- Repository for information about 0-days exploited in-the-wild.☆790Updated 2 weeks ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆532Updated 3 years ago
- Infrastructure powering the pwn.college dojo☆356Updated this week
- kernel-pwn and writeup collection☆611Updated last year
- Writeups for the challenges from DownUnderCTF 2021☆175Updated 2 years ago
- A collection of pwn/CTF related utilities for Ghidra☆678Updated 7 months ago
- Provide powerful tools for seccomp analysis☆1,036Updated this week
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 11 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,127Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆763Updated 4 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,306Updated 2 months ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆617Updated 2 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆691Updated 6 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,772Updated 5 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆314Updated 2 years ago