Jury System for attack-defence ctf game (ctf-scoreboard). Or you can use it for training.
☆28Sep 22, 2025Updated 5 months ago
Alternatives and similar repositories for ctf01d
Users that are interested in ctf01d are comparing it to the libraries listed below
Sorting:
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- Exploit distribution system for A&D competitions☆51Nov 26, 2025Updated 3 months ago
- PCAP-over-IP server written in Golang☆41Jun 2, 2025Updated 9 months ago
- FAUST Gameserver for attack-defense CTFs☆103Nov 21, 2025Updated 3 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆17Feb 25, 2026Updated last week
- 基于http代理的web漏洞扫描器的实现☆10Jul 5, 2015Updated 10 years ago
- Kubernetes Kubelet RCE Automated Script. Utilizes both "run" and "exec" debug handlers.☆10Sep 28, 2020Updated 5 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆20Feb 8, 2026Updated 3 weeks ago
- Passets 被动资产识别框架数据清洗模块。☆12Nov 26, 2020Updated 5 years ago
- ☆13Jun 26, 2025Updated 8 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆12Nov 1, 2022Updated 3 years ago
- CookieFarm is a Attack/Defense CTF framework inspired by DestructiveFarm, developed by the Italian team ByteTheCookies. What sets CookieF…☆19Updated this week
- Peaceful Farm is an Exploit Manager for Attack Defense CTFs, with a server to collect and submit flags, and a client to exploit adversary…☆10Apr 13, 2025Updated 10 months ago
- YAMPA is Yet Another Mitm Proxy for use in A/D CTFs☆16Jul 11, 2024Updated last year
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- Just tried to replicate a Google's Awesome Login and Register pages using Cash.js, Material Design and Routie.js☆11Mar 13, 2019Updated 6 years ago
- C4T BuT S4D Attack-Defence CTF☆13Feb 6, 2022Updated 4 years ago
- A tutorial on how to train RNN-T from scratch with Whisper encoder☆12Mar 11, 2025Updated 11 months ago
- Human Oversight for Autonomous AI Agents using Azure Logic Apps + Python☆20Feb 20, 2026Updated 2 weeks ago
- ☆20Apr 10, 2025Updated 10 months ago
- An explanation of the value in, and configuration of, using Azure Gateway Load Balancer to insert a layer of Network Virtual Appliances (…☆12Apr 5, 2023Updated 2 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆349May 24, 2022Updated 3 years ago
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆20Sep 10, 2025Updated 5 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆18Jun 11, 2019Updated 6 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago
- ☆18Jul 13, 2022Updated 3 years ago
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆18Oct 3, 2021Updated 4 years ago
- [CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE☆18Mar 17, 2025Updated 11 months ago
- Entra ID SPA and API Code Sample, using OAuth and OpenID Connect☆14Updated this week
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- Custom config.☆19May 17, 2023Updated 2 years ago
- Go Binance Bot run trades automatically and send notification to slack☆18Aug 30, 2023Updated 2 years ago
- evilginx2 + gophish☆14Sep 8, 2022Updated 3 years ago