secgroup / ctforge
Forge your own CTF
☆46Updated 3 years ago
Alternatives and similar repositories for ctforge:
Users that are interested in ctforge are comparing it to the libraries listed below
- Mignis is a semantic based tool for firewall configuration.☆42Updated 6 years ago
- TCP flow analyzer with sugar for A/D CTF☆138Updated 2 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆181Updated 10 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- A web UI and server for task based competitions employing Etherpad Lite.☆110Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆58Updated 3 weeks ago
- Challenges for INShAck 2018☆25Updated 5 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆102Updated 11 months ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 5 years ago
- FAUST Gameserver for attack-defense CTFs☆72Updated 4 months ago
- RSHack - Tool for RSA CTF's challenges☆96Updated 6 years ago
- Useful tips by OTA CTF members☆140Updated 5 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 7 years ago
- VoidHack CTF write-ups☆59Updated 6 years ago
- A multi-tenant network sandbox for security challenges☆79Updated 4 months ago
- The greatest tool to ever grace the computers of this earth 💯☆30Updated 6 years ago
- Writeups/solutions☆95Updated 5 years ago
- ☆20Updated 3 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆140Updated 5 years ago
- CTF Writeups☆186Updated 7 years ago
- Small python module for common CTF crypto functions☆166Updated 2 years ago
- Where CTFs happen☆81Updated 10 months ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 4 years ago
- Using Intel's PIN tool to solve CTF problems☆498Updated 5 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- ☆88Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆233Updated last month
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago