nategraf / NaumachiaLinks
A multi-tenant network sandbox for security challenges
☆85Updated last year
Alternatives and similar repositories for Naumachia
Users that are interested in Naumachia are comparing it to the libraries listed below
Sorting:
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 2 months ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 6 years ago
- Challenge repo from TAMUctf 2019☆47Updated 6 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆397Updated 3 years ago
- ☆182Updated 5 years ago
- ☆280Updated 5 years ago
- ☆77Updated 10 years ago
- Launch a fresh docker container per SSH connection☆50Updated 2 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆181Updated 8 years ago
- Vulnerability examples.☆412Updated last year
- Challenges for INShAck 2018☆25Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- Writeups for the ACI Cyberstakes CTF 2018☆23Updated 6 years ago
- Scapy hands-on at #GreHack17☆16Updated 8 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- Challenge Repository for CSAW CTF Quals 2019☆56Updated last week
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆36Updated last year
- Reverse engineering basics in puzzle form☆182Updated 5 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Updated 7 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago