smagnani96 / idcasView external linksLinks
Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
☆19Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for idcas
Users that are interested in idcas are comparing it to the libraries listed below
Sorting:
- An Intrusion Prevention System for Attack-Defense CTFs☆52Jul 19, 2024Updated last year
- Exploit distribution system for A&D competitions☆51Nov 26, 2025Updated 2 months ago
- Network traffic analysis tool for Attack & Defense CTF's☆115Updated this week
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Updated this week
- A tutorial on how to create and deploy a VPN server on GCP, followed by deploying a private k8s cluster which connects only through the V…☆11Sep 4, 2021Updated 4 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Network analysis tool for Attack Defence CTF☆425Oct 6, 2025Updated 4 months ago
- This library allows you to track the commits from the facepunch site.☆10Mar 30, 2023Updated 2 years ago
- cozy evergarden theme for discord☆17Aug 13, 2025Updated 6 months ago
- Plugins for Vencord☆13Jul 16, 2024Updated last year
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- ☆12Aug 12, 2016Updated 9 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- Get started on the PicoCalc using the Pico-Series C/C++ SDK.☆27Jan 31, 2026Updated 2 weeks ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- a simple and opinionated development plugin.☆12Sep 16, 2025Updated 5 months ago
- Install and configure harbor on your system.☆15Dec 17, 2025Updated last month
- Обеспечение отказоустойчивости для сетевых виртуальных машин, выполняющих функции межсетевого экранирования, сетевой безопасности и маршр…☆16Jun 27, 2025Updated 7 months ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆176Dec 6, 2023Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- Round-robin DNS LoadBalancer for Kubernetes☆12Dec 24, 2022Updated 3 years ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Backfire helix 3D scaffolds for weather satellites reception☆18Oct 21, 2025Updated 3 months ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Flu visualization tool☆10Mar 9, 2017Updated 8 years ago
- x64_dbg SDK version 010 in Delphi☆15Feb 7, 2021Updated 5 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago