CTF System that allows many things(^_^), used in HackMETU'15, HackMETU'16 and many private contests
☆12Feb 20, 2015Updated 11 years ago
Alternatives and similar repositories for CTFSys
Users that are interested in CTFSys are comparing it to the libraries listed below
Sorting:
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- CTF Workshop☆15Mar 21, 2017Updated 9 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- CyberChef update scripts in PowerShell & Bash☆18Apr 22, 2024Updated last year
- Saturate the bad guys' databases.☆14Jan 19, 2024Updated 2 years ago
- ☆17Mar 13, 2026Updated last week
- Defcoin source tree☆13Apr 15, 2021Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- Yewoh (pronounced yew-oh) is an Ultima Online library & server emulator built with bevy.☆16Nov 14, 2024Updated last year
- Vulnerability Environment Build with Dockerfile -> Docker Hub☆20May 16, 2025Updated 10 months ago
- Simple C program to quickly deobfuscate windows executables protected with Arxan.☆14Dec 18, 2022Updated 3 years ago
- Capture The Flag hacker contest daemon☆33Oct 21, 2017Updated 8 years ago
- 'apk-yara-checker' is a little CLI tool written in Rust to check Yara rules against a folder of APK files.☆16Jul 6, 2024Updated last year
- ☆51Sep 23, 2017Updated 8 years ago
- A short and simple python crawler, that uses Webkit and executes Javascript☆16Jan 25, 2013Updated 13 years ago
- Dwarf script to collect network requests and display on data panel☆21Mar 4, 2020Updated 6 years ago
- IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python'…☆29Feb 3, 2026Updated last month
- ☆17Nov 12, 2017Updated 8 years ago
- Runnable examples for Typed Clojure paper☆11Jul 2, 2015Updated 10 years ago
- A binary analysis framework written in Rust.☆21Jan 9, 2024Updated 2 years ago
- Symbolic executor for Binary Ninja's MLIL☆25Oct 3, 2024Updated last year
- E-Graph library☆22Apr 4, 2024Updated last year
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- Captchasec is a captcha difficulty tester. It uses de-captcher.com as an OCR server.☆27Nov 18, 2023Updated 2 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- undocumented github markdown things☆14Dec 18, 2018Updated 7 years ago
- A network packet synthesis language☆27Feb 13, 2026Updated last month
- Proof of concept cross architecture, cross operating system mod template for OpenGl powered games.☆12Feb 24, 2024Updated 2 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Oct 19, 2021Updated 4 years ago
- Boxbilling VestaCP Module v2☆14Jun 1, 2015Updated 10 years ago
- DCOS CLI in a Docker Container☆10Mar 29, 2017Updated 8 years ago
- A tool to brute force forms based authentication mechanism☆11Nov 2, 2019Updated 6 years ago
- Hacking Wars Capture The Flag☆10Dec 29, 2016Updated 9 years ago
- Tail, a typed and structured document editor☆87Mar 4, 2026Updated 2 weeks ago