mitre-cyber-academy / ctf-scoreboardView external linksLinks
This scoreboard allows you to host your own cybersecurity capture-the-flag (jeopardy-style or attack/defend) competition. Also includes team creation!
☆58Jan 13, 2026Updated last month
Alternatives and similar repositories for ctf-scoreboard
Users that are interested in ctf-scoreboard are comparing it to the libraries listed below
Sorting:
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Ruby library for interacting with Bugcrowd's VRT☆14Aug 19, 2025Updated 5 months ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- The core of shardbox.org☆16Aug 16, 2025Updated 6 months ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- ☆20Dec 19, 2017Updated 8 years ago
- A personalised Spotify quiz based on the music you listen to☆15Mar 24, 2021Updated 4 years ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- Bloodhound agent for Mythic☆24Apr 19, 2025Updated 9 months ago
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Serverless AWS application to upload and hash evidence files.☆23Oct 26, 2022Updated 3 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- Experiments in weaponizing Crystal for offensive operations.☆28Mar 23, 2023Updated 2 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Feb 8, 2023Updated 3 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago