Set up your own CTF with NIZKCTF
☆14Oct 20, 2017Updated 8 years ago
Alternatives and similar repositories for nizkctf-tutorial
Users that are interested in nizkctf-tutorial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Platform Test Edition☆17Mar 11, 2018Updated 8 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Upstream for Non Interactive Zero Knowledge CTF platform☆10May 21, 2020Updated 5 years ago
- This is how we interfere with broken AUR packages 🔧☆14Oct 16, 2024Updated last year
- ☆15Oct 9, 2021Updated 4 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- presentations given by CU Cyber☆14Aug 23, 2020Updated 5 years ago
- Propositional Encodings in C++11☆18Sep 6, 2018Updated 7 years ago
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- Pwn2Win CTF 2017☆27Nov 1, 2017Updated 8 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Pwn2Win CTF 2017 submissions☆18Nov 27, 2018Updated 7 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- OpenResty-based SOAP caching proxy for CNPq / Lattes Platform WebServices☆15Mar 13, 2021Updated 5 years ago
- PoC code using debugfs to store files in memory and execute them☆27May 25, 2018Updated 7 years ago
- Support ChaCha20+Poly1305 cipher suites for Debian/Ubuntu packages.☆10Aug 28, 2021Updated 4 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 3 years ago
- FuturFusion Cloud Migration Manager☆29Updated this week
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Bitstream to Verilog decompiler for Lattice FPGA ECP5 chip.☆23Oct 10, 2021Updated 4 years ago
- Altera JTAG UART wrapper for Bluespec☆25Mar 27, 2014Updated 11 years ago
- ☆10Dec 17, 2023Updated 2 years ago
- Challenges used in CUCTF 2019☆25Oct 13, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- [DEPRECATED] Security posture assessment tool for graph databases.☆21Jan 22, 2025Updated last year
- ☆10Apr 10, 2024Updated last year
- This repository is just a mirror. Use the bitbucket repository for issues and pull requests.☆11Dec 6, 2021Updated 4 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- D2 LOD v1.13d Maphack for Linux☆12Aug 19, 2015Updated 10 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- Pwn2Win CTF 2019 platform client☆26Aug 4, 2023Updated 2 years ago
- Online decorrelation of humidity and temperature in chemical sensors for continuous monitoring☆28Mar 27, 2017Updated 8 years ago
- A place to share libraries and utilities that don't belong in the core bsc repo☆38Feb 16, 2026Updated last month
- Dropbear SSH tools with ed25519 and other improvements by pts☆27Aug 16, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago