xairy / mipt-ctfView external linksLinks
A small course on CTF (wargames) for beginners [in Russian]
☆278Dec 26, 2021Updated 4 years ago
Alternatives and similar repositories for mipt-ctf
Users that are interested in mipt-ctf are comparing it to the libraries listed below
Sorting:
- ☆35Dec 26, 2020Updated 5 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆384Jun 28, 2013Updated 12 years ago
- Resources for learning in IT | Список материалов для обучения в ИТ☆45Apr 6, 2021Updated 4 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Optimization methods course at MIPT☆12Apr 24, 2018Updated 7 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆10May 22, 2022Updated 3 years ago
- ☆12Apr 7, 2016Updated 9 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆548Dec 26, 2021Updated 4 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,245Jul 22, 2024Updated last year
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆21Mar 20, 2021Updated 4 years ago
- Git manager for pentesters☆108Jun 4, 2016Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,556Sep 11, 2025Updated 5 months ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Some setup scripts for security research tools.☆9,284Updated this week
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- A collection of cheatsheets for various infosec tools and topics.☆812Mar 1, 2021Updated 4 years ago
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- Checksystem for attack-defense CTF☆74Jul 16, 2025Updated 6 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Feb 25, 2021Updated 4 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,004Aug 27, 2022Updated 3 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Lectures in MIPT: intro to engineering software using model-checking.☆17Apr 19, 2021Updated 4 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Feb 14, 2022Updated 4 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago