echoCTF is a pioneer computer security framework, developed by Echothrust Solutions, for running CyberSecurity exercises and competitions such as Capture the Flag. echoCTF allows building and running capture the flag competitions for network penetration testing and security auditing on real IT infrastructure. It is also used for security awareness and training purposes, by businesses and educational institutes. What is echoCTF.RED echoCTF.RED (codename Mycenae), is the first iteration of our online long running CTF service, based on the applications from this repository. It is a free online service that offers a controlled environment, based on real-life systems and services, to train and sharpen your offensive and defensive security skills. Scan, brute-force and do whatever it takes to attack the systems and solve the real-life security scenarios to gain points. For more information about our competitions visit https://echoCTF.com/ or if you'd rather see a live example of our platform feel free to visit https://echoCTF.RED/ Our main goals for echoCTF include: - Completeness - Provide a complete set of tools and applications to develop, deploy and maintain competitions - Modularity - E
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
SecGen creates vulnerable virtual machines and hacking challenges for learning security penetration testing techniques.
Certificate Transparency Monitor that alerts you when an SSL/TLS certificate is issued for your domains.
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
CLI program for cybersecurity solution management with multiple functionalities and authentication methods.
An open-source artifact metadata API for managing metadata about software resources and governing the software supply chain.
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.