smagnani96 / idcasLinks
Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
☆20Updated 3 years ago
Alternatives and similar repositories for idcas
Users that are interested in idcas are comparing it to the libraries listed below
Sorting:
- Kiddy - (linux) kernel identity spoofer☆15Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆134Updated last week
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- PCAP-over-IP server written in Golang☆40Updated 7 months ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- Where CTFs happen☆82Updated last year
- ☆108Updated 11 months ago
- Network traffic analysis tool for Attack & Defense CTF's☆113Updated last week
- Exploit distribution system for A&D competitions☆50Updated last month
- Scapy hands-on☆35Updated 2 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆51Updated last year
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- ☆68Updated 4 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆126Updated last month
- PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and t…☆49Updated this week
- Write ups for Ph0wn CTF☆47Updated 5 months ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago
- JFFS2 filesystem extraction tool☆85Updated last week
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- A tool for firmware cartography☆162Updated last month
- Web interface to explore Suricata EVE outputs☆84Updated this week
- ☆131Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- CYBAR OSINT CTF 2020☆23Updated 5 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆29Updated last year
- Mitrastar MIPS router analysis and exploitation☆19Updated 4 years ago
- DEbian Cve REproducer Tool☆27Updated 2 weeks ago
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsec☆17Updated 2 months ago
- ☆90Updated last month