smagnani96 / idcas
Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
☆18Updated 2 years ago
Alternatives and similar repositories for idcas:
Users that are interested in idcas are comparing it to the libraries listed below
- Network traffic analysis tool for Attack & Defense CTF's☆51Updated this week
- An Intrusion Prevention System for Attack-Defense CTFs☆44Updated 9 months ago
- Exploit distribution system for A&D competitions☆43Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- Content related to hardware hacking☆51Updated 6 years ago
- Challenge infrastructure used for the DownUnderCTF competition☆22Updated last month
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆64Updated 3 years ago
- ☆20Updated 3 years ago
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- Fork Free Fail Repeat☆46Updated 3 years ago
- Scapy hands-on☆34Updated last year
- Where CTFs happen☆81Updated 10 months ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆40Updated 8 months ago
- CYBAR OSINT CTF 2020☆23Updated 4 years ago
- redpwn's challenge deployment system☆27Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsec☆13Updated 2 months ago
- yet another hidden LKM hunter☆21Updated last year
- Web interface to explore Suricata EVE outputs☆54Updated 4 months ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Exploiting Linksys WRT54G using a vulnerability I found.☆34Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆110Updated 5 months ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆55Updated 2 weeks ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated 2 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆64Updated 7 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago