smagnani96 / idcasLinks
Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
☆20Updated 2 years ago
Alternatives and similar repositories for idcas
Users that are interested in idcas are comparing it to the libraries listed below
Sorting:
- Exploit distribution system for A&D competitions☆45Updated 6 months ago
- Network traffic analysis tool for Attack & Defense CTF's☆60Updated this week
- An Intrusion Prevention System for Attack-Defense CTFs☆44Updated 10 months ago
- Scapy hands-on☆34Updated last year
- Where CTFs happen☆81Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Research tools developed for Intel Wi-Fi chips☆54Updated last year
- Challenge infrastructure used for the DownUnderCTF competition☆23Updated last week
- Ghidra scripts for recovering string definitions in Go binaries☆114Updated 6 months ago
- Runs exploits, fast.☆83Updated 10 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not stra…☆30Updated 5 years ago
- Linux rootkit for educational purposes☆31Updated last year
- Fork Free Fail Repeat☆48Updated 3 years ago
- ☆123Updated last year
- ☆46Updated last year
- redpwn's challenge deployment system☆28Updated last year
- A/D CTF services developed for ECSC 2022☆12Updated 2 years ago
- iTLB multihit PoC☆41Updated last year
- A binary hardening system☆109Updated last year
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆71Updated 2 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 11 months ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- A tool for firmware cartography☆152Updated this week
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Mitrastar MIPS router analysis and exploitation☆16Updated 3 years ago
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsec☆15Updated last month
- FAUST Gameserver for attack-defense CTFs☆74Updated 5 months ago