This framework aims at helping your team create jeopardy CTF challenges using a configurable structure which will enable efficient integration and deployment on the CTF infrastructure. This project was initially created for managing challenges for INS'hAck 2017. You can find challenges and writeups of the past editions of INS'hAck in this repository. This project evolved over time to enable even more automation when deploying challenges on a Rancher-based infrastructure. Caution: Your mkCTF repository shall remain private until the CTF event ends. It stores flags in plaintext to allow CTF admins to rebuild challenges from sources without generating new flags. It is recommended to enable 2FA add defensive layers to your repository. Do not generate or manage read-only access token lightly. Do not give access to your repository to untrusted users. Dependencies: This project requires Python 3.9+ and has been designed and tested on Linux only. It might work on Darwin and Windows Subsystem for Linux as well. Other dependencies will depend on the challenges themselves. Setup: You can setup mkCTF in a few steps: curl -o setup.sh https://raw.githubusercontent.com/koromodako/mkctf/m
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide for implementing best practices in cybersecurity across various systems.
A Python script to check system compliance against CIS Benchmarks with customizable options.
The OWASP AppSec Europe '16 Conference is a leading gathering in web application security, featuring keynote speakers and in-depth trainings in application security topics.
A tool for auditing and reporting Unix host security with the ability to perform a lockdown.
A security dataset and CTF platform with full and attack-only versions pre-indexed for Splunk.
echoCTF is a computer security framework for running cybersecurity exercises and competitions like Capture the Flag, used for network penetration testing and security auditing.
Domain registration and web hosting services with free features and 24/7 customer support
A microservice for string padding to prevent global issues like the left-pad incident.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.