Autonomous CTF solver that races multiple AI models in parallel. 1st place BSidesSF 2026.
☆367Mar 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for ctf-agent
Users that are interested in ctf-agent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- A Frida-based utility for dynamically extracting native (.so) libraries from Android applications.☆56Feb 6, 2026Updated 2 months ago
- ☆102Mar 18, 2026Updated 3 weeks ago
- ☆34Apr 14, 2025Updated last year
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- MCP for Pwn☆243Mar 12, 2026Updated last month
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- AIS3 2024 情資運用及防禦的課堂教材☆49Mar 26, 2025Updated last year
- CVE-2024-4577 RCE PoC☆25Nov 20, 2024Updated last year
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 8 months ago
- ☆21Jun 2, 2020Updated 5 years ago
- An x86_64 Linux decompiler written in Python!☆14Jan 16, 2019Updated 7 years ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆175Nov 11, 2024Updated last year
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 5 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Aug 11, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- My CTF Writeup☆28Nov 20, 2024Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆20Jun 6, 2025Updated 10 months ago
- Challenges and writeups for PatriotCTF 2023☆26Sep 11, 2023Updated 2 years ago
- Slides from Off-By-One Conferences☆34Sep 9, 2024Updated last year
- Research browsers☆49Jan 9, 2026Updated 3 months ago
- ☆14Oct 11, 2017Updated 8 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 2 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CVE-2024-53691☆15Jan 13, 2025Updated last year
- OCB-AES authenticated encryption for Python☆14Oct 22, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- windows debug and exploit toolset for both user and kernel mode☆195Jun 12, 2025Updated 10 months ago
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- A tool for automating setup of kernel pwn challenges☆62Oct 28, 2025Updated 5 months ago