Attack-Defence CTF framework that uses application containers instead of virtual machines
☆54Aug 12, 2016Updated 9 years ago
Alternatives and similar repositories for inctf-framework
Users that are interested in inctf-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- The iCTF Framework, presented by Shellphish!☆334Feb 15, 2023Updated 3 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Scripts to automate simple tasks throughout learning process at UET-VNU☆17Jun 8, 2021Updated 4 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10May 8, 2026Updated last week
- ☆21Aug 5, 2020Updated 5 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- ☆16Mar 23, 2018Updated 8 years ago
- Yet Another Nand Dumper☆23Sep 7, 2023Updated 2 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- ROP-Gadget finder in Rust☆18Feb 2, 2018Updated 8 years ago
- A sandbox to protect your pwn challenges being pwned in CTF AWD.☆85Dec 5, 2018Updated 7 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 9 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆13Feb 7, 2017Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Feb 2, 2018Updated 8 years ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Yet another xinetd docker used to build pwnable challenges.☆37Jun 28, 2019Updated 6 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- rune - radare2 based symbolic emulator☆27Aug 29, 2017Updated 8 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Pure haskell encoding of MLIR for printing, parsing, and mutating MLIR within haskell☆17Oct 30, 2020Updated 5 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- ☆13Feb 29, 2020Updated 6 years ago