infosec-ucalgary / magpieCTF2022-publicLinks
Challenges and other resources for magpieCTF 2022.
☆16Updated 3 years ago
Alternatives and similar repositories for magpieCTF2022-public
Users that are interested in magpieCTF2022-public are comparing it to the libraries listed below
Sorting:
- Export UVic schedule to a .ics file☆12Updated 3 years ago
- A collection of write-ups and solutions for Cyber FastTrack Spring 2021.☆48Updated 4 years ago
- Challenges and other resources for magpieCTF 2021.☆19Updated 3 years ago
- ☆11Updated 3 years ago
- 🔐 Vulnerability remediation scoring system☆125Updated last year
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆44Updated 4 months ago
- A tool to easily archive CTFd sites to GitHub Pages☆38Updated this week
- ctfcli is a tool to manage Capture The Flag events and challenges☆197Updated last month
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated 3 months ago
- Terraform module for the salable deployment of CTFd on AWS☆19Updated 3 months ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Network analysis tool for Attack Defence CTF☆378Updated this week
- An aggregation of CTF challenges and write-ups for csictf 2020!☆55Updated 2 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆302Updated this week
- The updated website for b01lers CTF!☆12Updated last week
- Steganalysis web platform☆693Updated 2 months ago
- A small CTFd plugin to send notifications about solves and admin announcements to Slack/Discord/Telegram☆13Updated 3 years ago
- Public Archive for CSAW 2024 Quals☆11Updated last year
- A small collection of potentially useful contract templates☆406Updated 4 months ago
- redpwn's CTF platform☆274Updated 8 months ago
- Identify privilege escalation paths within and across different clouds☆703Updated last month
- Learn Binary Exploitation with sample problems and solutions☆157Updated 2 years ago
- Automate writeup for vulnerable machines.☆40Updated 2 years ago
- Writeups for the challenges from DownUnderCTF 2021☆179Updated 3 years ago
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆13Updated last year
- Hash identification program.☆154Updated 3 years ago
- Files + Writeups for DownUnderCTF 2020 Challenges☆167Updated 4 years ago
- A curated reading list about offensive IT security☆144Updated last month
- Some wrrite-ups☆18Updated 7 months ago