echoCTF is a pioneer computer security framework, developed by Echothrust Solutions, for running CyberSecurity exercises and competitions such as Capture the Flag. echoCTF allows building and running capture the flag competitions for network penetration testing and security auditing on real IT infrastructure. It is also used for security awareness and training purposes, by businesses and educational institutes. What is echoCTF.RED echoCTF.RED (codename Mycenae), is the first iteration of our online long running CTF service, based on the applications from this repository. It is a free online service that offers a controlled environment, based on real-life systems and services, to train and sharpen your offensive and defensive security skills. Scan, brute-force and do whatever it takes to attack the systems and solve the real-life security scenarios to gain points. For more information about our competitions visit https://echoCTF.com/ or if you'd rather see a live example of our platform feel free to visit https://echoCTF.RED/ Our main goals for echoCTF include: - Completeness - Provide a complete set of tools and applications to develop, deploy and maintain competitions - Modularity - E
FEATURES
ALTERNATIVES
A company that helps organizations create security-aware teams and produce bug-free software.
Kubernetes security platform with industry standard open source utilities for securing Kubernetes clusters and apps.
A tool to secure your shell commands history by clearing sensitive commands
A CTF platform inspired by motherfuckingwebsite.com, emphasizing simplicity and lightweight features.
Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.
A tool for auditing and reporting Unix host security with the ability to perform a lockdown.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
Script to check for artifacts with the same name between repositories to prevent Dependency Confusion Attacks.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.