A small course on CTF (wargames) for beginners [in Russian]
☆279Dec 26, 2021Updated 4 years ago
Alternatives and similar repositories for mipt-ctf
Users that are interested in mipt-ctf are comparing it to the libraries listed below
Sorting:
- ☆35Dec 26, 2020Updated 5 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆385Jun 28, 2013Updated 12 years ago
- Command-line utility to properly name movies☆26Dec 26, 2022Updated 3 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆550Dec 26, 2021Updated 4 years ago
- Sensible repository licensing for Humans☆23Apr 7, 2015Updated 10 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- ☆12Apr 7, 2016Updated 9 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆11May 22, 2022Updated 3 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,355Jul 22, 2024Updated last year
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆21Mar 20, 2021Updated 5 years ago
- A collection of cheatsheets for various infosec tools and topics.☆812Mar 1, 2021Updated 5 years ago
- Collection of free books, papers and articles related to CTF challenges.☆386Feb 22, 2019Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- Some setup scripts for security research tools.☆9,323Mar 1, 2026Updated 3 weeks ago
- My proof-of-concept exploits for the Linux kernel☆1,569Sep 11, 2025Updated 6 months ago
- GraphBitStreamer - поиск несжатой графики в ресурсах игр☆24Apr 24, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Installs bat (a cat replacement) via ansible☆10Feb 24, 2021Updated 5 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- FBTools allows you to access Facebook via command-line.It provides some features that are not available via Facebook Graph API.☆46Jul 8, 2017Updated 8 years ago
- A Cross Platform Problem Recommendation Engine☆18Jan 25, 2018Updated 8 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- Git manager for pentesters☆108Jun 4, 2016Updated 9 years ago
- A collection of links related to Linux kernel security and exploitation☆6,386Mar 7, 2026Updated 2 weeks ago
- ☆10Jun 14, 2016Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆179Dec 6, 2023Updated 2 years ago
- ☆12Jul 1, 2018Updated 7 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago