nategraf / Naumachia
A multi-tenant network sandbox for security challenges
☆79Updated 4 months ago
Alternatives and similar repositories for Naumachia:
Users that are interested in Naumachia are comparing it to the libraries listed below
- Open-source challenges for Naumachia☆12Updated last year
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- Challenge repo from TAMUctf 2019☆46Updated 6 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- ☆280Updated 4 years ago
- A web UI and server for task based competitions employing Etherpad Lite.☆110Updated 6 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆385Updated 2 years ago
- Challenges for INShAck 2018☆25Updated 5 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 7 years ago
- Useful tips by OTA CTF members☆140Updated 5 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- How to build an efficient pwn development environment in 2020☆263Updated 4 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 5 years ago
- DarkNight theme for Ghidra☆126Updated 4 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆76Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆58Updated 3 weeks ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆158Updated 5 years ago
- ☆107Updated 6 years ago
- ☆77Updated 9 years ago
- Vulnerability examples.☆404Updated 11 months ago
- ☆182Updated 5 years ago
- service to check internet accessibility☆42Updated 11 months ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- Fix stack addresses (when no ASLR) with and without debugging☆181Updated 10 years ago