nategraf / Naumachia-challenges
Open-source challenges for Naumachia
☆12Updated last year
Alternatives and similar repositories for Naumachia-challenges:
Users that are interested in Naumachia-challenges are comparing it to the libraries listed below
- A multi-tenant network sandbox for security challenges☆79Updated 3 months ago
- Challenge repo from TAMUctf 2019☆46Updated 6 years ago
- Useful tips by OTA CTF members☆139Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆383Updated 2 years ago
- Useful crypto tools for CTF☆40Updated 2 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Web Exploitation Workflow for CTF Challenges☆49Updated 8 years ago
- OSEE Preparation☆175Updated 6 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- Automatic exploit generation for simple linux pwn challenges.☆319Updated last year
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- ☆24Updated 8 years ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆135Updated 2 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆75Updated 5 years ago
- ☆87Updated 6 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 5 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆144Updated 5 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- Exploitation and Mitigation Slides☆127Updated 9 months ago
- Repository to deploy CTFd using docker.☆41Updated 4 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago