nategraf / NaumachiaLinks
A multi-tenant network sandbox for security challenges
☆79Updated 5 months ago
Alternatives and similar repositories for Naumachia
Users that are interested in Naumachia are comparing it to the libraries listed below
Sorting:
- Challenge repo from TAMUctf 2019☆46Updated 6 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- Open-source challenges for Naumachia☆12Updated last year
- Useful tips by OTA CTF members☆140Updated 5 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Manage building and deploying exploitation challenges with ease☆58Updated last month
- ☆280Updated 5 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆388Updated 2 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- A web UI and server for task based competitions employing Etherpad Lite.☆111Updated 6 years ago
- ☆182Updated 5 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- ☆77Updated 10 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 10 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆102Updated last year
- educational x86 kernel☆28Updated 4 years ago
- DarkNight theme for Ghidra☆126Updated 4 years ago
- meta repository for ctftime.org issues, feature-requests etc☆74Updated 8 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 3 months ago
- Useful crypto tools for CTF☆40Updated 2 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Launch a fresh docker container per SSH connection☆50Updated last year