Attack-Defence CTF framework that uses application containers instead of virtual machines
☆54Aug 12, 2016Updated 9 years ago
Alternatives and similar repositories for inctf-framework
Users that are interested in inctf-framework are comparing it to the libraries listed below
Sorting:
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- The iCTF Framework, presented by Shellphish!☆336Feb 15, 2023Updated 3 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- A docker image to hold pwn challenges in ctf war☆54Oct 1, 2018Updated 7 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- Scripts to automate simple tasks throughout learning process at UET-VNU☆18Jun 8, 2021Updated 4 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Dead simple format string exploit payload generator☆24Mar 22, 2017Updated 8 years ago
- ☆16Mar 23, 2018Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- ☆29May 11, 2025Updated 10 months ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- Blockchains. Destruction. Mayhem.☆50Dec 7, 2022Updated 3 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 9 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Yet another xinetd docker used to build pwnable challenges.☆37Jun 28, 2019Updated 6 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Pure haskell encoding of MLIR for printing, parsing, and mutating MLIR within haskell☆17Oct 30, 2020Updated 5 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- ☆13Feb 29, 2020Updated 6 years ago