A small course on CTF (wargames) for beginners [in Russian]
☆279Dec 26, 2021Updated 4 years ago
Alternatives and similar repositories for mipt-ctf
Users that are interested in mipt-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lecture and exercises on CTF crypto tasks☆17Apr 16, 2014Updated 11 years ago
- Course on web programming taught at MIPT, 2014-2015☆133Oct 26, 2017Updated 8 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- A place to discuss potential projects for students of the ISIS Lab.☆385Jun 28, 2013Updated 12 years ago
- Command-line utility to properly name movies☆26Dec 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A set of Linux binary exploitation tasks for beginners on various architectures☆551Dec 26, 2021Updated 4 years ago
- Учебное пособие по защите информации кафедры радиотехники и систем управления МФТИ☆442Oct 11, 2022Updated 3 years ago
- Sensible repository licensing for Humans☆23Apr 7, 2015Updated 11 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Optimization methods course at MIPT☆11Apr 24, 2018Updated 7 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,434Jul 22, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆21Mar 20, 2021Updated 5 years ago
- A collection of cheatsheets for various infosec tools and topics.☆812Mar 1, 2021Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Материалы курса АКОС на ФПМИ☆341Sep 10, 2025Updated 7 months ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- 📝 Papers I read and notes/reviews I made. Also useful links to courses (RL/NLP/Bio/QC/DevOps)☆10May 4, 2021Updated 4 years ago
- Some setup scripts for security research tools.☆9,345Mar 1, 2026Updated last month
- My proof-of-concept exploits for the Linux kernel☆1,572Sep 11, 2025Updated 7 months ago
- ☆23Nov 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Installs bat (a cat replacement) via ansible☆10Feb 24, 2021Updated 5 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- ☆80Nov 10, 2024Updated last year
- ☆12Dec 14, 2021Updated 4 years ago
- A Cross Platform Problem Recommendation Engine☆18Jan 25, 2018Updated 8 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- A collection of links related to Linux kernel security and exploitation☆6,392Mar 7, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Jun 14, 2016Updated 9 years ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆180Dec 6, 2023Updated 2 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Data mining and machine learning course at MIPT☆24Nov 8, 2015Updated 10 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago