Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
☆20Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for idcas
Users that are interested in idcas are comparing it to the libraries listed below
Sorting:
- Exploit distribution system for A&D competitions☆51Nov 26, 2025Updated 3 months ago
- Network traffic analysis tool for Attack & Defense CTF's☆119Updated this week
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A tutorial on how to create and deploy a VPN server on GCP, followed by deploying a private k8s cluster which connects only through the V…☆11Sep 4, 2021Updated 4 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Network analysis tool for Attack Defence CTF☆425Oct 6, 2025Updated 5 months ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆39Feb 11, 2026Updated 3 weeks ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- cozy evergarden theme for discord☆17Aug 13, 2025Updated 6 months ago
- 🔒 Private Internet Access VPN Configurations & CLI for NixOS☆12Feb 27, 2026Updated last week
- Status bar using web technologies.☆12Jan 14, 2021Updated 5 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- A dumb launcher to spawn swaylock and ensure it runs no matter what☆12Apr 30, 2022Updated 3 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Generate super easily and various share link.☆13Jan 6, 2023Updated 3 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- Install and configure harbor on your system.☆15Dec 17, 2025Updated 2 months ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆178Dec 6, 2023Updated 2 years ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- My zsh configuration files☆15Jul 5, 2023Updated 2 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 9 months ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- x64_dbg SDK version 010 in Delphi☆15Feb 7, 2021Updated 5 years ago
- Command line utility to make copy pasta easier☆10May 1, 2025Updated 10 months ago
- A script for brute forcing Roku TVs and installing applications remotely.☆12Mar 25, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago