Attack-Defend CTF Tools
☆23Oct 30, 2016Updated 9 years ago
Alternatives and similar repositories for CTF-Tools
Users that are interested in CTF-Tools are comparing it to the libraries listed below
Sorting:
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- 创新杯管理系统☆12Mar 6, 2026Updated 2 weeks ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- A hacky tool to patch PE binaries.☆25Jan 1, 2018Updated 8 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- ☆47Dec 7, 2022Updated 3 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Active Directory Toolkit☆20Apr 9, 2019Updated 6 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- The sec3 audit reports and publications☆11Feb 2, 2026Updated last month
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 10 months ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago