Miscellaneous for Ctf
Collection of specialized cybersecurity tools in OT, ICS, IoT, Mobiel and other specialized areas. Task: Ctf
Explore 23 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
Framework for creating jeopardy CTF challenges with configurable structure and efficient integration.
A lightweight CTF platform inspired by motherfuckingwebsite.com with a focus on challenge difficulty.
A security dataset and CTF platform with full and attack-only versions pre-indexed for Splunk.
echoCTF is a computer security framework for running cybersecurity exercises and competitions like Capture the Flag, used for network penetration testing and security auditing.
Node package for preparing CTF events with OWASP Juice Shop challenges for popular CTF frameworks.
A tool for scraping CTF writeups from ctftime.org and organizing them for easy access.
A simple security capture the flag framework for running contests
A CTF platform inspired by motherfuckingwebsite.com, emphasizing simplicity and lightweight features.
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
Collection of CTF writeups from September 2018 onwards, including various CTFs and HackTheBox.
SecGen creates vulnerable virtual machines and hacking challenges for learning security penetration testing techniques.
A collection of CTF source files and write-ups that anyone can contribute to
Platform for hosting Jeopardy and 'King of the Hill' style Capture the Flag competitions.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.