mcpa-stlouis / hack-the-archLinks
Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!
☆71Updated 2 years ago
Alternatives and similar repositories for hack-the-arch
Users that are interested in hack-the-arch are comparing it to the libraries listed below
Sorting:
- A simple capture the flag framework.☆122Updated 8 years ago
- Scoreboard for Capture The Flag competitions.☆169Updated 3 years ago
- BSidesCBR CTF docker compose files☆67Updated 5 years ago
- ☆122Updated 7 years ago
- Small CTF challenges running on Docker☆159Updated 6 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- Simple REST-style web service for the CVE searching☆98Updated 2 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- Red Team Resources☆60Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆81Updated 2 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆76Updated 3 weeks ago
- ☆51Updated 9 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- unix wildcard attacks☆134Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆154Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- Perform timing attacks against web applications☆123Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- ☆89Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆45Updated 8 years ago