mitre-cyber-academy / 2016-ctf-gameLinks
Repo containing links to all CTF Challenges used in the 2015 MITRE CTF.
☆15Updated 6 years ago
Alternatives and similar repositories for 2016-ctf-game
Users that are interested in 2016-ctf-game are comparing it to the libraries listed below
Sorting:
- BSidesCBR CTF docker compose files☆67Updated 5 years ago
- Repo containing links to all CTF Challenges used in the 2018 MITRE CTF. http://mitrecyberacademy.org/☆61Updated 6 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Updated 8 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- ☆92Updated 6 years ago
- ☆113Updated 8 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- ☆26Updated 7 years ago
- ☆108Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- ☆122Updated 7 years ago
- Hacking challenges☆31Updated 7 years ago
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Summary & User Write-Ups of Hacky Easter 2019☆50Updated 4 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- ☆52Updated 4 years ago
- Small CTF challenges running on Docker☆159Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Autoruns plugin for the Volatility framework☆122Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 11 months ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- DefCon24☆121Updated 8 years ago
- Code Review Audit Script Scanner☆140Updated last month
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago