mcpa-stlouis / hack-the-arch
Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!
☆70Updated 2 years ago
Alternatives and similar repositories for hack-the-arch:
Users that are interested in hack-the-arch are comparing it to the libraries listed below
- A simple capture the flag framework.☆121Updated 7 years ago
- Scoreboard for Capture The Flag competitions.☆169Updated 2 years ago
- BSidesCBR CTF docker compose files☆67Updated 4 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- ☆50Updated 7 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- ProFTPD IAC Remote Root Exploit☆37Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- unix wildcard attacks☆131Updated 6 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A repository of challenges from various CTF competitions.☆155Updated 10 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ☆122Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Red Team Resources☆59Updated 6 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Walkthrough some CTFs☆50Updated 4 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- Some of the scripts I use.☆41Updated 7 years ago
- Collection of things made during my preparation to take on OSCE☆188Updated 3 years ago
- 🏴 Collection of CTF solutions☆75Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Hacking challenges☆32Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- ☆51Updated 8 years ago