Where CTFs happen
☆82May 30, 2024Updated last year
Alternatives and similar repositories for ctfhub
Users that are interested in ctfhub are comparing it to the libraries listed below
Sorting:
- ☆11Nov 25, 2020Updated 5 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Mar 27, 2021Updated 4 years ago
- ☆63Jul 23, 2024Updated last year
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆592Feb 11, 2026Updated 3 weeks ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- go-bssid-geolocator☆14Mar 19, 2025Updated 11 months ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- A compiler for microarchitectural weird machines☆19Aug 10, 2024Updated last year
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- ☆14May 30, 2018Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last week
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Challenges from pbctf 2020☆34Dec 16, 2020Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Open KLara Project☆36Feb 12, 2026Updated 3 weeks ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- my goto docker image when playing ctfs with all the tools I need☆21Updated this week