mitre-cyber-academy / 2016-ctf-gameView external linksLinks
Repo containing links to all CTF Challenges used in the 2015 MITRE CTF.
☆14Oct 8, 2018Updated 7 years ago
Alternatives and similar repositories for 2016-ctf-game
Users that are interested in 2016-ctf-game are comparing it to the libraries listed below
Sorting:
- ☆10Feb 8, 2024Updated 2 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆12Jan 2, 2020Updated 6 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Public release of the sources for SunshineCTF 2017 challenges☆11Oct 31, 2017Updated 8 years ago
- NUS Greyhats CTF101 Web Security Lesson Material☆10Aug 22, 2015Updated 10 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- gRPC Authentication using Google id_tokens☆10Jul 23, 2024Updated last year
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- PostScript examples useful for attacking Ghostscript.☆13Aug 1, 2024Updated last year
- Documenting the austrian "ID Wallet" (eAusweise / Digitales Amt)☆15Feb 7, 2023Updated 3 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- What? Really? AnoTHer CTF Framework☆12Oct 21, 2018Updated 7 years ago
- Test your javascript knowledge☆12Jan 10, 2018Updated 8 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- my write up about ctf☆15Jan 29, 2018Updated 8 years ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 7 months ago
- ☆11Oct 24, 2017Updated 8 years ago
- A few exercises from Zed Shaw’s “Learn C the Hard Way”☆21Dec 16, 2019Updated 6 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12May 24, 2016Updated 9 years ago
- LASACTF Problem Source☆13Aug 12, 2016Updated 9 years ago
- ☆16Jan 29, 2024Updated 2 years ago
- Intentionally Vulnerable Node Applications☆16Mar 12, 2020Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- A Byte of Python book☆13May 4, 2018Updated 7 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- Dumping CTF related code here☆17May 3, 2017Updated 8 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Install Openshift Docker Meetup Jakarta-Indonesia☆17Oct 1, 2019Updated 6 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- Utilities for working with Kony mobile applications.☆19Jul 12, 2024Updated last year
- Empty project to quick start Proof of Concept app development☆29Feb 15, 2025Updated last year
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 7 years ago
- Small tool to log HTTP requests for debugging.☆16May 9, 2020Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago