rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.
☆10Apr 13, 2019Updated 7 years ago
Alternatives and similar repositories for rlyCTF
Users that are interested in rlyCTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- Fully working chess game implemented in the x86 Intel Assembly language☆12Oct 3, 2022Updated 3 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A tool to encode and decode content as whitespace☆20Sep 24, 2023Updated 2 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reverse transparent protocol agnostic socks proxy.☆17Jan 14, 2020Updated 6 years ago
- ☆11Jan 31, 2020Updated 6 years ago
- my dotfiles☆13Oct 5, 2025Updated 6 months ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- 📖 Yeni başlayanlar için Git (Versiyon Kontrol Sistemi) kitabı☆13Mar 22, 2026Updated last month
- ☆14Nov 11, 2023Updated 2 years ago
- This project is regarding Motion Planning for Autonomous Vehicle under uncertainty. There are various kinds of uncertainty for an autonom…☆15Jul 18, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Interactive workshop for using Falco, a security tool in the CNCF☆10Jan 22, 2021Updated 5 years ago
- [DEPRECATED] This component is now retired. Thank you for the memories!☆16Mar 12, 2025Updated last year
- ☆11Apr 8, 2024Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 10 months ago
- Meeting Manager for Jitsi using Token Auth☆18Aug 2, 2023Updated 2 years ago
- Samsung Innovation Campus Python Course☆14Feb 19, 2025Updated last year
- Tmux plugin that adds support for scriptable variables in the status line☆18Feb 1, 2018Updated 8 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PeekFx allows loading and decompilation of groups of .NET framework assemblies.☆29Feb 1, 2023Updated 3 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Simple XXE test suite generated specifically for SAML interfaces☆23May 18, 2018Updated 7 years ago
- Simple script to convert tables from Oracle to MySQL☆13Oct 3, 2020Updated 5 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- ☆48Feb 21, 2021Updated 5 years ago
- Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"☆26Jun 11, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Web uygulama güvenliğine dair içerikler☆22Sep 2, 2024Updated last year
- Twitter bot made using Markov Chains and powered through nonsensical garbage from the comments section of a local newspaper☆21Jan 11, 2026Updated 3 months ago
- A ZSH plugin that provides functions which integrate & bind fuzzy finder capabilities through fzf to certain commands such as ls, man, fi…☆26Nov 23, 2023Updated 2 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- This is the python wrapper for The Security Framework SRDF☆49Apr 29, 2014Updated 12 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago