krmaxwell / coding-entertainment
Puzzles, challenges, games, CTFs, and other entertainment via coding
☆201Updated 3 years ago
Alternatives and similar repositories for coding-entertainment:
Users that are interested in coding-entertainment are comparing it to the libraries listed below
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆275Updated 9 years ago
- A weekly challenge where we share some code and you find a bug in it.☆70Updated 9 years ago
- A list of security blogs.☆57Updated 6 years ago
- Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabili…☆51Updated 4 years ago
- Teach you a binary exploitation for great good.☆292Updated 6 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Custom slash command to do a basic nmap scan from within Slack☆25Updated 8 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 6 years ago
- ☆115Updated 9 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆384Updated 11 years ago
- A docker based honeypot.☆148Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- ☆45Updated 7 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- A regex based source code scanner.☆129Updated 7 years ago
- Cyber Security Base with F-Secure☆52Updated 5 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- HTTP framework☆48Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆113Updated 4 years ago
- ☆279Updated 4 years ago
- ☆92Updated 6 years ago
- A deliberately-vulnerable website and exercises for teaching about the OWASP Top 10☆186Updated 8 months ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- ☆135Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆123Updated 9 years ago