obilodeau / ceopardyLinks
Game Board for NorthSec's Hacker Jeopardy since 2017
☆14Updated 8 months ago
Alternatives and similar repositories for ceopardy
Users that are interested in ceopardy are comparing it to the libraries listed below
Sorting:
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 11 years ago
- CTF collaboration tool for teams☆10Updated 8 years ago
- materials we hand out☆147Updated 6 months ago
- This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).☆272Updated 6 months ago
- Code Review Audit Script Scanner☆143Updated 4 months ago
- ☆280Updated 5 years ago
- ☆625Updated 3 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 8 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆399Updated 3 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆36Updated last year
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- Private keys that have become public ...☆185Updated this week
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆406Updated 2 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 6 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- CTFs, solutions and presentations☆296Updated 3 months ago
- Security, hacking conferences (list)☆548Updated last week
- A multi-tenant network sandbox for security challenges☆86Updated last year
- Configs for NECCDC 2017☆16Updated 8 years ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- Example queries for joern☆18Updated 9 years ago
- Release Branches for MoFlow☆307Updated 10 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- ☆111Updated 8 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- OWASP IoT Security Verification Standard (ISVS)☆148Updated 4 months ago