mcpa-stlouis / hack-the-arch
Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!
☆70Updated 2 years ago
Alternatives and similar repositories for hack-the-arch:
Users that are interested in hack-the-arch are comparing it to the libraries listed below
- A simple capture the flag framework.☆121Updated 7 years ago
- Small CTF challenges running on Docker☆158Updated 6 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- BSidesCBR CTF docker compose files☆67Updated 4 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆81Updated 2 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Scoreboard for Capture The Flag competitions.☆169Updated 2 years ago
- ☆122Updated 7 years ago
- VoidHack CTF write-ups☆59Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- WhiteBox CMS analysis☆69Updated last year
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- ☆50Updated 7 years ago
- ProFTPD IAC Remote Root Exploit☆37Updated 7 years ago
- Some of the scripts I use.☆41Updated 8 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆141Updated 7 months ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆236Updated 2 years ago
- A CTF framework to create, build, deploy and monitor challenges☆113Updated 6 months ago
- ☆61Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- Red Team Resources☆59Updated 6 years ago