Random files such as wordlists which maybe be useful for playing our game
☆24Aug 2, 2025Updated 8 months ago
Alternatives and similar repositories for rfctf-files
Users that are interested in rfctf-files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Aug 11, 2024Updated last year
- This will be a wiki when it grows up, if it grows up☆95Aug 11, 2025Updated 8 months ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- Digital Metadata Receive, Record, and Report☆16Oct 3, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 3 months ago
- Project HAS Violet by HVDN is about hardware, antenna and software!☆18Jul 17, 2022Updated 3 years ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- WLAN Receiver for GNU Radio on Android☆13Aug 4, 2020Updated 5 years ago
- ☆15Mar 21, 2025Updated last year
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 5 months ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆17Oct 30, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- A script to help configure DOD Smart Cards (Common Access Card (CAC)).☆11Apr 2, 2024Updated 2 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆13Jul 20, 2024Updated last year
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- this is a very simple python script that you can cron job to clear history over 30 days old. Use at own risk under GNU public license.☆11May 5, 2017Updated 8 years ago
- Python Based QAM64 MODEM (Modulator - Demodulator) With Scrambler!☆14Jun 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Freelance DevOps Engineer, Platform Engineer and Site Reliability Engineer, with an extensive Linux SysAdmin and Infrastructure backgroun…☆17Jun 6, 2024Updated last year
- Home of https://redteam.guide☆15Apr 1, 2026Updated last week
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- ☆14May 10, 2023Updated 2 years ago
- docker-microtsocks☆11Sep 7, 2023Updated 2 years ago
- A collection of resources and knowledge for analysis of scATAC+scRNA multi omics data☆10Sep 16, 2022Updated 3 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Riegel Computer☆17Jun 30, 2023Updated 2 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- ☆15Apr 4, 2022Updated 4 years ago
- Ansible playbooks to install various utility and security tools to localhost☆12Apr 4, 2022Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Updated version of ADT Tools with simplified user interface and enhanced functions.☆22Oct 19, 2020Updated 5 years ago