mcpa-stlouis / hack-the-arch
Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!
☆69Updated last year
Alternatives and similar repositories for hack-the-arch:
Users that are interested in hack-the-arch are comparing it to the libraries listed below
- A simple capture the flag framework.☆121Updated 7 years ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- BSidesCBR CTF docker compose files☆69Updated 4 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆62Updated 2 years ago
- ☆122Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆57Updated 6 years ago
- A repository of challenges from various CTF competitions.☆154Updated 10 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆55Updated 5 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆81Updated last year
- Walkthrough some CTFs☆49Updated 4 years ago
- Scoreboard for Capture The Flag competitions.☆168Updated 2 years ago
- Some of the scripts I use.☆41Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- ProFTPD IAC Remote Root Exploit☆38Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated 2 years ago
- A CTF framework to create, build, deploy and monitor challenges☆107Updated 3 months ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆188Updated 2 years ago
- Automated Tactics Techniques & Procedures☆252Updated last year
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆50Updated 8 years ago