Attack-Defend CTF Tools
☆23Oct 30, 2016Updated 9 years ago
Alternatives and similar repositories for CTF-Tools
Users that are interested in CTF-Tools are comparing it to the libraries listed below
Sorting:
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- ☆12Dec 26, 2017Updated 8 years ago
- ☆14Jun 11, 2022Updated 3 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- The collection of all Python program from various CTF's☆26Oct 11, 2015Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆13Apr 30, 2016Updated 9 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Active Directory Toolkit☆20Apr 9, 2019Updated 6 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago