Attack-Defence CTF framework that uses application containers instead of virtual machines
☆54Aug 12, 2016Updated 9 years ago
Alternatives and similar repositories for inctf-framework
Users that are interested in inctf-framework are comparing it to the libraries listed below
Sorting:
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆14Oct 8, 2019Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- Tool to generate info for the AWS penetration testing request form☆19Oct 21, 2016Updated 9 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Dec 28, 2017Updated 8 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ☆16Mar 23, 2018Updated 7 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Format string exploitation helper☆46Nov 16, 2015Updated 10 years ago
- A better DNS Cache Snooping tool☆19Mar 8, 2025Updated 11 months ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- A very, very simple time machine for Linux written in shell script that uses cron and git☆23May 2, 2022Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago