echoCTF is a pioneer computer security framework, developed by Echothrust Solutions, for running CyberSecurity exercises and competitions such as Capture the Flag. echoCTF allows building and running capture the flag competitions for network penetration testing and security auditing on real IT infrastructure. It is also used for security awareness and training purposes, by businesses and educational institutes. What is echoCTF.RED echoCTF.RED (codename Mycenae), is the first iteration of our online long running CTF service, based on the applications from this repository. It is a free online service that offers a controlled environment, based on real-life systems and services, to train and sharpen your offensive and defensive security skills. Scan, brute-force and do whatever it takes to attack the systems and solve the real-life security scenarios to gain points. For more information about our competitions visit https://echoCTF.com/ or if you'd rather see a live example of our platform feel free to visit https://echoCTF.RED/ Our main goals for echoCTF include: - Completeness - Provide a complete set of tools and applications to develop, deploy and maintain competitions - Modularity - E
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.
Non-profit organization supporting the advancement of open source software.
A platform for version control and collaboration in software development projects.
A CTF platform inspired by motherfuckingwebsite.com, emphasizing simplicity and lightweight features.
A super-simple, modern framework for organizing and automating cybersecurity tasks.
Free multi-platform database tool with support for various databases and rich features.
Security tips for setting up an Apache HTTP Server to prevent security issues.
A comprehensive guide for implementing best practices in cybersecurity across various systems.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.