The Node package juice-shop-ctf-cli helps you to prepare Capture the Flag events with the OWASP Juice Shop challenges for different popular CTF frameworks. This interactive utility allows you to populate a CTF game server in a matter of minutes. Supported CTF Frameworks: - CTFd (3.6 or higher) - RootTheBox (3.3 or higher) - FBCTF Setup: - npm install -g juice-shop-ctf-cli Usage: - Interactive Mode: Open a command line and run: juice-shop-ctf. Then follow the instructions of the interactive command line tool. - Configuration File: Instead of answering questions in the CLI, you can also provide your desired configuration in a file with specific format.
A tool to extract links from responses and filter them via decoding/sorting
A command-line tool for taking website screenshots and mobile emulations
SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences.
Detailed explanations of steps taken to solve challenges in Capture The Flag competitions.
Repository for IBM SOAR Apps source-code and development resources.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.