mitre-cyber-academy / 2016-ctf-gameLinks
Repo containing links to all CTF Challenges used in the 2015 MITRE CTF.
☆15Updated 6 years ago
Alternatives and similar repositories for 2016-ctf-game
Users that are interested in 2016-ctf-game are comparing it to the libraries listed below
Sorting:
- ☆92Updated 6 years ago
- ☆113Updated 8 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- ☆52Updated 4 years ago
- BSidesCBR CTF docker compose files☆67Updated 5 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- ☆26Updated 7 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- Extract Sense out of Gibberish stuff☆82Updated 8 years ago
- Networking and attacking scripts.☆10Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Repo containing links to all CTF Challenges used in the 2018 MITRE CTF. http://mitrecyberacademy.org/☆61Updated 6 years ago
- Some of the scripts I use.☆41Updated 8 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- DefCon24☆121Updated 8 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- Small CTF challenges running on Docker☆159Updated 6 years ago
- ☆122Updated 7 years ago
- ☆26Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- ☆88Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago