🕶 Design fun and insightful CTF challenges
☆72Mar 17, 2022Updated 4 years ago
Alternatives and similar repositories for awesome-ctf-challenge-design
Users that are interested in awesome-ctf-challenge-design are comparing it to the libraries listed below
Sorting:
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 3 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- ☆16Mar 17, 2017Updated 9 years ago
- ☆17Feb 26, 2019Updated 7 years ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- Challenge examples for GZ::CTF☆36Mar 6, 2024Updated 2 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Jun 5, 2021Updated 4 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- A tool for uploading/downloading files anonymously with client-side encryption☆15Dec 1, 2025Updated 3 months ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- A collection of challenges I made for CTF competitions☆17Jan 28, 2026Updated last month
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆21Jun 10, 2025Updated 9 months ago
- ☆36Mar 3, 2023Updated 3 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- Unofficial Dockerfile and scripts for building CodeQL databases for the OpenJDK☆49Jan 7, 2024Updated 2 years ago
- ☆14Aug 28, 2023Updated 2 years ago
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- Several XStream gadgets ported from ysoserial☆33Sep 26, 2021Updated 4 years ago
- public archive for corCTF 2022☆37Aug 16, 2022Updated 3 years ago
- Upcoming list of ctfs directly in your terminal!☆16Apr 17, 2023Updated 2 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- The best articles and videos related to computer science and programming I found.☆11Apr 27, 2020Updated 5 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 2 months ago
- A golang CTF competition platform with high-performance, security and low hardware requirements.☆14Nov 30, 2021Updated 4 years ago
- ☆13Oct 30, 2023Updated 2 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 8 months ago
- ☆35Aug 5, 2025Updated 7 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆207Mar 5, 2026Updated 2 weeks ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago