smagnani96 / idcasLinks
Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
☆20Updated 2 years ago
Alternatives and similar repositories for idcas
Users that are interested in idcas are comparing it to the libraries listed below
Sorting:
- Network traffic analysis tool for Attack & Defense CTF's☆75Updated this week
- Challenge infrastructure used for the DownUnderCTF competition☆24Updated 2 months ago
- FAUST Gameserver for attack-defense CTFs☆82Updated last month
- Where CTFs happen☆81Updated last year
- Runs exploits, fast.☆87Updated last year
- Exploit distribution system for A&D competitions☆45Updated 8 months ago
- MikroTik remote jailbreak for v6.x.x☆137Updated 2 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆47Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- European Cyber Security Challenge Gameboard☆28Updated 3 years ago
- Content related to hardware hacking☆53Updated 6 years ago
- Research tools developed for Intel Wi-Fi chips☆55Updated last month
- Write ups for Ph0wn CTF☆43Updated this week
- redpwn's challenge deployment system☆28Updated last year
- Extendable Visualization & Exploitation tool for glibc heap☆72Updated 3 months ago
- Web interface to explore Suricata EVE outputs☆65Updated this week
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 9 months ago
- ☆124Updated last year
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- TCP flow analyzer with sugar for A/D CTF☆142Updated 2 years ago
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsec☆15Updated 3 months ago
- ☆95Updated 3 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆43Updated last year
- ☆99Updated 6 months ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆11Updated last year
- Scapy hands-on☆34Updated last year
- A beginner-friendly CTF about Kubernetes security.☆78Updated 3 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆82Updated 2 years ago
- A tool for firmware cartography☆157Updated 2 months ago