jaeswift-website/api/data/awesomelist/apsdehal--awesome-ctf.json

1 line
No EOL
31 KiB
JSON

{"slug": "apsdehal--awesome-ctf", "title": "Awesome Ctf", "description": "A curated list of CTF frameworks, libraries, resources and softwares", "github_url": "https://github.com/apsdehal/awesome-ctf", "stars": "7.4K", "tag": "Security", "entry_count": 221, "subcategory_count": 4, "subcategories": [{"name": "Contributing", "parent": "", "entries": []}, {"name": "Why?", "parent": "", "entries": []}, {"name": "Contents", "parent": "", "entries": [{"name": "Awesome CTF", "url": "#awesome-ctf", "description": ""}, {"name": "Resources", "url": "#resources", "description": ""}, {"name": "Kali Linux CTF Blueprints", "url": "https://www.packtpub.com/eu/networking-and-servers/kali-linux-ctf-blueprints", "description": "Online book on building, testing, and customizing your own Capture the Flag challenges."}, {"name": "Dnscat2", "url": "https://github.com/iagox86/dnscat2", "description": "Hosts communication through DNS.", "stars": "2.8k"}, {"name": "Kroll Artifact Parser and Extractor (KAPE)", "url": "https://learn.duffandphelps.com/kape", "description": "Triage program."}, {"name": "Magnet AXIOM", "url": "https://www.magnetforensics.com/downloadaxiom", "description": "Artifact-centric DFIR tool."}, {"name": "Registry Dumper", "url": "http://www.kahusecurity.com/posts/registry_dumper_find_and_dump_hidden_registry_keys.html", "description": "Dump your registry."}, {"name": "CTFd", "url": "https://github.com/isislab/CTFd", "description": "Platform to host jeopardy style CTFs from ISISLab, NYU Tandon.", "stars": "4.3k"}, {"name": "echoCTF.RED", "url": "https://github.com/echoCTF/echoCTF.RED", "description": "Develop, deploy and maintain your own CTF infrastructure.", "stars": "40"}, {"name": "FBCTF", "url": "https://github.com/facebook/fbctf", "description": "Platform to host Capture the Flag competitions from Facebook.", "stars": "6.5k"}, {"name": "Haaukins", "url": "https://github.com/aau-network-security/haaukins", "description": "A Highly Accessible and Automated Virtualization Platform for Security Education.", "stars": "146"}, {"name": "HackTheArch", "url": "https://github.com/mcpa-stlouis/hack-the-arch", "description": "CTF scoring platform.", "stars": "62"}, {"name": "Mellivora", "url": "https://github.com/Nakiami/mellivora", "description": "A CTF engine written in PHP.", "stars": "405"}, {"name": "MotherFucking-CTF", "url": "https://github.com/andreafioraldi/motherfucking-ctf", "description": "Badass lightweight plaform to host CTFs. No JS involved.", "stars": "42"}, {"name": "NightShade", "url": "https://github.com/UnrealAkama/NightShade", "description": "A simple security CTF framework.", "stars": "104"}, {"name": "OpenCTF", "url": "https://github.com/easyctf/openctf", "description": "CTF in a box. Minimal setup required.", "stars": "78"}, {"name": "PicoCTF", "url": "https://github.com/picoCTF/picoCTF", "description": "The platform used to run picoCTF. A great framework to host any CTF.", "stars": "265"}, {"name": "PyChallFactory", "url": "https://github.com/pdautry/py_chall_factory", "description": "Small framework to create/manage/package jeopardy CTF challenges.", "stars": "83"}, {"name": "RootTheBox", "url": "https://github.com/moloch--/RootTheBox", "description": "A Game of Hackers (CTF Scoreboard & Game Manager).", "stars": "691"}, {"name": "Scorebot", "url": "https://github.com/legitbs/scorebot", "description": "Platform for CTFs by Legitbs (Defcon).", "stars": "46"}, {"name": "SecGen", "url": "https://github.com/cliffe/SecGen", "description": "Security Scenario Generator. Creates randomly vulnerable virtual machines.", "stars": "2.4k"}, {"name": "Metasploit JavaScript Obfuscator", "url": "https://github.com/rapid7/metasploit-framework/wiki/How-to-obfuscate-JavaScript-in-Metasploit", "description": "", "stars": "29k"}, {"name": "Uglify", "url": "https://github.com/mishoo/UglifyJS", "description": "", "stars": "12k"}, {"name": "Bettercap", "url": "https://github.com/bettercap/bettercap", "description": "Framework to perform MITM (Man in the Middle) attacks.", "stars": "12k"}, {"name": "Yersinia", "url": "https://github.com/tomac/yersinia", "description": "Attack various protocols on layer 2.", "stars": "548"}, {"name": "CyberChef", "url": "https://gchq.github.io/CyberChef", "description": "Web app for analysing and decoding data."}, {"name": "FeatherDuster", "url": "https://github.com/nccgroup/featherduster", "description": "An automated, modular cryptanalysis tool.", "stars": "989"}, {"name": "Hash Extender", "url": "https://github.com/iagox86/hash_extender", "description": "A utility tool for performing hash length extension attacks.", "stars": "888"}, {"name": "padding-oracle-attacker", "url": "https://github.com/KishanBagaria/padding-oracle-attacker", "description": "A CLI tool to execute padding oracle attacks.", "stars": "154"}, {"name": "PkCrack", "url": "https://www.unix-ag.uni-kl.de/\\~conrad/krypto/pkcrack.html", "description": "A tool for Breaking PkZip-encryption."}, {"name": "QuipQuip", "url": "https://quipqiup.com", "description": "An online tool for breaking substitution ciphers or vigenere ciphers (without key)."}, {"name": "RSACTFTool", "url": "https://github.com/Ganapati/RsaCtfTool", "description": "A tool for recovering RSA private key with various attack.", "stars": "3.9k"}, {"name": "RSATool", "url": "https://github.com/ius/rsatool", "description": "Generate private key with knowledge of p and q.", "stars": "851"}, {"name": "XORTool", "url": "https://github.com/hellman/xortool", "description": "A tool to analyze multi-byte xor cipher.", "stars": "1.2k"}, {"name": "Hashcat", "url": "https://hashcat.net/hashcat/", "description": "Password Cracker"}, {"name": "Hydra", "url": "https://tools.kali.org/password-attacks/hydra", "description": "A parallelized login cracker which supports numerous protocols to attack"}, {"name": "John The Jumbo", "url": "https://github.com/magnumripper/JohnTheRipper", "description": "Community enhanced version of John the Ripper.", "stars": "6.9k"}, {"name": "John The Ripper", "url": "http://www.openwall.com/john/", "description": "Password Cracker."}, {"name": "Nozzlr", "url": "https://github.com/intrd/nozzlr", "description": "Nozzlr is a bruteforce framework, trully modular and script-friendly.", "stars": "61"}, {"name": "Ophcrack", "url": "http://ophcrack.sourceforge.net/", "description": "Windows password cracker based on rainbow tables."}, {"name": "Patator", "url": "https://github.com/lanjelot/patator", "description": "Patator is a multi-purpose brute-forcer, with a modular design.", "stars": "3k"}, {"name": "Turbo Intruder", "url": "https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack", "description": "Burp Suite extension for sending large numbers of HTTP requests"}, {"name": "DLLInjector", "url": "https://github.com/OpenSecurityResearch/dllinjector", "description": "Inject dlls in processes.", "stars": "453"}, {"name": "libformatstr", "url": "https://github.com/hellman/libformatstr", "description": "Simplify format string exploitation.", "stars": "332"}, {"name": "Metasploit", "url": "http://www.metasploit.com/", "description": "Penetration testing software."}, {"name": "one\\_gadget", "url": "https://github.com/david942j/one_gadget", "description": "A tool to find the one gadget `execve('/bin/sh', NULL, NULL)` call.", "stars": "1.7k"}, {"name": "Pwntools", "url": "https://github.com/Gallopsled/pwntools", "description": "CTF Framework for writing exploits.", "stars": "9.5k"}, {"name": "Qira", "url": "https://github.com/BinaryAnalysisPlatform/qira", "description": "QEMU Interactive Runtime Analyser.", "stars": "3.6k"}, {"name": "ROP Gadget", "url": "https://github.com/JonathanSalwan/ROPgadget", "description": "Framework for ROP exploitation.", "stars": "3.2k"}, {"name": "V0lt", "url": "https://github.com/P1kachu/v0lt", "description": "Security CTF Toolkit.", "stars": "358"}, {"name": "Aircrack-Ng", "url": "http://www.aircrack-ng.org/", "description": "Crack 802.11 WEP and WPA-PSK keys."}, {"name": "Audacity", "url": "http://sourceforge.net/projects/audacity/", "description": "Analyze sound files (mp3, m4a, whatever)."}, {"name": "Bkhive and Samdump2", "url": "http://sourceforge.net/projects/ophcrack/files/samdump2/", "description": "Dump SYSTEM and SAM files."}, {"name": "CFF Explorer", "url": "http://www.ntcore.com/exsuite.php", "description": "PE Editor."}, {"name": "Creddump", "url": "https://github.com/moyix/creddump", "description": "Dump windows credentials.", "stars": "219"}, {"name": "DVCS Ripper", "url": "https://github.com/kost/dvcs-ripper", "description": "Rips web accessible (distributed) version control systems.", "stars": "1.5k"}, {"name": "Exif Tool", "url": "http://www.sno.phy.queensu.ca/\\~phil/exiftool/", "description": "Read, write and edit file metadata."}, {"name": "Extundelete", "url": "http://extundelete.sourceforge.net/", "description": "Used for recovering lost data from mountable images."}, {"name": "Fibratus", "url": "https://github.com/rabbitstack/fibratus", "description": "Tool for exploration and tracing of the Windows kernel.", "stars": "1.7k"}, {"name": "Foremost", "url": "http://foremost.sourceforge.net/", "description": "Extract particular kind of files using headers."}, {"name": "Fsck.ext4", "url": "http://linux.die.net/man/8/fsck.ext3", "description": "Used to fix corrupt filesystems."}, {"name": "Malzilla", "url": "http://malzilla.sourceforge.net/", "description": "Malware hunting tool."}, {"name": "NetworkMiner", "url": "http://www.netresec.com/?page=NetworkMiner", "description": "Network Forensic Analysis Tool."}, {"name": "PDF Streams Inflater", "url": "http://malzilla.sourceforge.net/downloads.html", "description": "Find and extract zlib files compressed in PDF files."}, {"name": "Pngcheck", "url": "http://www.libpng.org/pub/png/apps/pngcheck.html", "description": "Verifies the integrity of PNG and dump all of the chunk-level information in human-readable form."}, {"name": "ResourcesExtract", "url": "http://www.nirsoft.net/utils/resources_extract.html", "description": "Extract various filetypes from exes."}, {"name": "Shellbags", "url": "https://github.com/williballenthin/shellbags", "description": "Investigate NT\\_USER.dat files.", "stars": "139"}, {"name": "Snow", "url": "https://sbmlabs.com/notes/snow_whitespace_steganography_tool", "description": "A Whitespace Steganography Tool."}, {"name": "USBRip", "url": "https://github.com/snovvcrash/usbrip", "description": "Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.", "stars": "1.1k"}, {"name": "Volatility", "url": "https://github.com/volatilityfoundation/volatility", "description": "To investigate memory dumps.", "stars": "5.7k"}, {"name": "Wireshark", "url": "https://www.wireshark.org", "description": "Used to analyze pcap or pcapng files"}, {"name": "OfflineRegistryView", "url": "https://www.nirsoft.net/utils/offline_registry_view.html", "description": "Simple tool for Windows that allows you to read offline Registry files from external drive and view the desired Registry key in .reg file format."}, {"name": "Registry Viewer®", "url": "https://accessdata.com/product-download/registry-viewer-2-0-0", "description": "Used to view Windows registries."}, {"name": "Masscan", "url": "https://github.com/robertdavidgraham/masscan", "description": "Mass IP port scanner, TCP port scanner.", "stars": "20k"}, {"name": "Monit", "url": "https://linoxide.com/monitoring-2/monit-linux/", "description": "A linux tool to check a host on the network (and other non-network activities)."}, {"name": "Nipe", "url": "https://github.com/GouveaHeitor/nipe", "description": "Nipe is a script to make Tor Network your default gateway.", "stars": "1.5k"}, {"name": "Nmap", "url": "https://nmap.org/", "description": "An open source utility for network discovery and security auditing."}, {"name": "Wireshark", "url": "https://www.wireshark.org/", "description": "Analyze the network dumps."}, {"name": "Zeek", "url": "https://www.zeek.org", "description": "An open-source network security monitor."}, {"name": "Zmap", "url": "https://zmap.io/", "description": "An open-source network scanner."}, {"name": "Androguard", "url": "https://github.com/androguard/androguard", "description": "Reverse engineer Android applications.", "stars": "4.1k"}, {"name": "Angr", "url": "https://github.com/angr/angr", "description": "platform-agnostic binary analysis framework.", "stars": "6.2k"}, {"name": "Apk2Gold", "url": "https://github.com/lxdvs/apk2gold", "description": "Yet another Android decompiler.", "stars": "616"}, {"name": "ApkTool", "url": "http://ibotpeaches.github.io/Apktool/", "description": "Android Decompiler."}, {"name": "Barf", "url": "https://github.com/programa-stic/barf-project", "description": "Binary Analysis and Reverse engineering Framework.", "stars": "1.3k"}, {"name": "Binary Ninja", "url": "https://binary.ninja/", "description": "Binary analysis framework."}, {"name": "BinUtils", "url": "http://www.gnu.org/software/binutils/binutils.html", "description": "Collection of binary tools."}, {"name": "BinWalk", "url": "https://github.com/devttys0/binwalk", "description": "Analyze, reverse engineer, and extract firmware images.", "stars": "8.6k"}, {"name": "Boomerang", "url": "https://github.com/BoomerangDecompiler/boomerang", "description": "Decompile x86/SPARC/PowerPC/ST-20 binaries to C.", "stars": "322"}, {"name": "ctf\\_import", "url": "https://github.com/docileninja/ctf_import", "description": "run basic functions from stripped binaries cross platform.", "stars": "100"}, {"name": "cwe\\_checker", "url": "https://github.com/fkie-cad/cwe_checker", "description": "cwe\\_checker finds vulnerable patterns in binary executables.", "stars": "741"}, {"name": "demovfuscator", "url": "https://github.com/kirschju/demovfuscator", "description": "A work-in-progress deobfuscator for movfuscated binaries.", "stars": "597"}, {"name": "Frida", "url": "https://github.com/frida/", "description": "Dynamic Code Injection."}, {"name": "GDB", "url": "https://www.gnu.org/software/gdb/", "description": "The GNU project debugger."}, {"name": "GEF", "url": "https://github.com/hugsy/gef", "description": "GDB plugin.", "stars": "5.1k"}, {"name": "Ghidra", "url": "https://ghidra-sre.org/", "description": "Open Source suite of reverse engineering tools. Similar to IDA Pro."}, {"name": "Hopper", "url": "http://www.hopperapp.com/", "description": "Reverse engineering tool (disassembler) for OSX and Linux."}, {"name": "IDA Pro", "url": "https://www.hex-rays.com/products/ida/", "description": "Most used Reversing software."}, {"name": "Jadx", "url": "https://github.com/skylot/jadx", "description": "Decompile Android files.", "stars": "32k"}, {"name": "Java Decompilers", "url": "http://www.javadecompilers.com", "description": "An online decompiler for Java and Android APKs."}, {"name": "Krakatau", "url": "https://github.com/Storyyeller/Krakatau", "description": "Java decompiler and disassembler.", "stars": "1.6k"}, {"name": "Objection", "url": "https://github.com/sensepost/objection", "description": "Runtime Mobile Exploration.", "stars": "5.4k"}, {"name": "PEDA", "url": "https://github.com/longld/peda", "description": "GDB plugin (only python2.7).", "stars": "5.2k"}, {"name": "Pin", "url": "https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool", "description": "A dynamic binary instrumentaion tool by Intel."}, {"name": "PINCE", "url": "https://github.com/korcankaraokcu/PINCE", "description": "GDB front-end/reverse engineering tool, focused on game-hacking and automation.", "stars": "1.5k"}, {"name": "PinCTF", "url": "https://github.com/ChrisTheCoolHut/PinCTF", "description": "A tool which uses intel pin for Side Channel Analysis.", "stars": "449"}, {"name": "Plasma", "url": "https://github.com/joelpx/plasma", "description": "An interactive disassembler for x86/ARM/MIPS which can generate indented pseudo-code with colored syntax.", "stars": "3k"}, {"name": "Pwndbg", "url": "https://github.com/pwndbg/pwndbg", "description": "A GDB plugin that provides a suite of utilities to hack around GDB easily.", "stars": "5k"}, {"name": "radare2", "url": "https://github.com/radare/radare2", "description": "A portable reversing framework.", "stars": "17k"}, {"name": "Triton", "url": "https://github.com/JonathanSalwan/Triton/", "description": "Dynamic Binary Analysis (DBA) framework.", "stars": "2.6k"}, {"name": "Uncompyle", "url": "https://github.com/gstarnberger/uncompyle", "description": "Decompile Python 2.7 binaries (.pyc).", "stars": "410"}, {"name": "WinDbg", "url": "http://www.windbg.org/", "description": "Windows debugger distributed by Microsoft."}, {"name": "Xocopy", "url": "http://reverse.lostrealm.com/tools/xocopy.html", "description": "Program that can copy executables with execute, but no read permission."}, {"name": "Z3", "url": "https://github.com/Z3Prover/z3", "description": "A theorem prover from Microsoft Research.", "stars": "8.1k"}, {"name": "Detox", "url": "http://relentless-coding.org/projects/jsdetox/install", "description": "A Javascript malware analysis tool."}, {"name": "Revelo", "url": "http://www.kahusecurity.com/posts/revelo_javascript_deobfuscator.html", "description": "Analyze obfuscated Javascript code."}, {"name": "RABCDAsm", "url": "https://github.com/CyberShadow/RABCDAsm", "description": "Collection of utilities including an ActionScript 3 assembler/disassembler.", "stars": "402"}, {"name": "Swftools", "url": "http://www.swftools.org/", "description": "Collection of utilities to work with SWF files."}, {"name": "Xxxswf", "url": "https://bitbucket.org/Alexander_Hanel/xxxswf", "description": "A Python script for analyzing Flash files."}, {"name": "CSWSH", "url": "http://cow.cat/cswsh.html", "description": "Cross-Site WebSocket Hijacking Tester."}, {"name": "Request Bin", "url": "https://requestbin.com/", "description": "Lets you inspect http requests to a particular url."}, {"name": "AperiSolve", "url": "https://aperisolve.fr/", "description": "Aperi'Solve is a platform which performs layer analysis on image (open-source)."}, {"name": "Convert", "url": "http://www.imagemagick.org/script/convert.php", "description": "Convert images b/w formats and apply filters."}, {"name": "Exif", "url": "http://manpages.ubuntu.com/manpages/trusty/man1/exif.1.html", "description": "Shows EXIF information in JPEG files."}, {"name": "Exiftool", "url": "https://linux.die.net/man/1/exiftool", "description": "Read and write meta information in files."}, {"name": "Exiv2", "url": "http://www.exiv2.org/manpage.html", "description": "Image metadata manipulation tool."}, {"name": "Image Steganography", "url": "https://sourceforge.net/projects/image-steg/", "description": "Embeds text and files in images with optional encryption. Easy-to-use UI."}, {"name": "Image Steganography Online", "url": "https://incoherency.co.uk/image-steganography", "description": "This is a client-side Javascript tool to steganographically hide images inside the lower \"bits\" of other images"}, {"name": "ImageMagick", "url": "http://www.imagemagick.org/script/index.php", "description": "Tool for manipulating images."}, {"name": "Outguess", "url": "https://www.freebsd.org/cgi/man.cgi?query=outguess+\\&apropos=0\\&sektion=0\\&manpath=FreeBSD+Ports+5.1-RELEASE\\&format=html", "description": "Universal steganographic tool."}, {"name": "Pngtools", "url": "https://packages.debian.org/sid/pngtools", "description": "For various analysis related to PNGs."}, {"name": "SmartDeblur", "url": "https://github.com/Y-Vladimir/SmartDeblur", "description": "Used to deblur and fix defocused images.", "stars": "2.2k"}, {"name": "Steganabara", "url": "https://www.openhub.net/p/steganabara", "description": "Tool for stegano analysis written in Java."}, {"name": "SteganographyOnline", "url": "https://stylesuxx.github.io/steganography/", "description": "Online steganography encoder and decoder."}, {"name": "Stegbreak", "url": "https://linux.die.net/man/1/stegbreak", "description": "Launches brute-force dictionary attacks on JPG image."}, {"name": "StegCracker", "url": "https://github.com/Paradoxis/StegCracker", "description": "Steganography brute-force utility to uncover hidden data inside files.", "stars": "471"}, {"name": "stegextract", "url": "https://github.com/evyatarmeged/stegextract", "description": "Detect hidden files and text in images.", "stars": "98"}, {"name": "Steghide", "url": "http://steghide.sourceforge.net/", "description": "Hide data in various kind of images."}, {"name": "StegOnline", "url": "https://georgeom.net/StegOnline/upload", "description": "Conduct a wide range of image steganography operations, such as concealing/revealing files hidden within bits (open-source)."}, {"name": "Stegsolve", "url": "http://www.caesum.com/handbook/Stegsolve.jar", "description": "Apply various steganography techniques to images."}, {"name": "Zsteg", "url": "https://github.com/zed-0xff/zsteg/", "description": "PNG/BMP analysis.", "stars": "940"}, {"name": "BurpSuite", "url": "https://portswigger.net/burp", "description": "A graphical tool to testing website security."}, {"name": "Commix", "url": "https://github.com/commixproject/commix", "description": "Automated All-in-One OS Command Injection and Exploitation Tool.", "stars": "3.5k"}, {"name": "Hackbar", "url": "https://addons.mozilla.org/en-US/firefox/addon/hackbartool/", "description": "Firefox addon for easy web exploitation."}, {"name": "OWASP ZAP", "url": "https://www.owasp.org/index.php/Projects/OWASP_Zed_Attack_Proxy_Project", "description": "Intercepting proxy to replay, debug, and fuzz HTTP requests and responses"}, {"name": "Postman", "url": "https://chrome.google.com/webstore/detail/postman/fhbjgbiflinjbdggehcddcbncdddomop?hl=en", "description": "Add on for chrome for debugging network requests."}, {"name": "Raccoon", "url": "https://github.com/evyatarmeged/Raccoon", "description": "A high performance offensive security tool for reconnaissance and vulnerability scanning.", "stars": "2.6k"}, {"name": "SQLMap", "url": "https://github.com/sqlmapproject/sqlmap", "description": "Automatic SQL injection and database takeover tool.", "stars": "25k"}, {"name": "W3af", "url": "https://github.com/andresriancho/w3af", "description": "Web Application Attack and Audit Framework.", "stars": "4k"}, {"name": "XSSer", "url": "http://xsser.sourceforge.net/", "description": "Automated XSS testor."}, {"name": "Android Tamer", "url": "https://androidtamer.com/", "description": "Based on Debian."}, {"name": "BackBox", "url": "https://backbox.org/", "description": "Based on Ubuntu."}, {"name": "BlackArch Linux", "url": "https://blackarch.org/", "description": "Based on Arch Linux."}, {"name": "Fedora Security Lab", "url": "https://labs.fedoraproject.org/security/", "description": "Based on Fedora."}, {"name": "Kali Linux", "url": "https://www.kali.org/", "description": "Based on Debian."}, {"name": "Parrot Security OS", "url": "https://www.parrotsec.org/", "description": "Based on Debian."}, {"name": "Pentoo", "url": "http://www.pentoo.ch/", "description": "Based on Gentoo."}, {"name": "URIX OS", "url": "http://urix.us/", "description": "Based on openSUSE."}, {"name": "Wifislax", "url": "http://www.wifislax.com/", "description": "Based on Slackware."}, {"name": "Flare VM", "url": "https://github.com/fireeye/flare-vm/", "description": "Based on Windows.", "stars": "4.1k"}, {"name": "REMnux", "url": "https://remnux.org/", "description": "Based on Debian."}, {"name": "CTF Tools", "url": "https://github.com/zardus/ctf-tools", "description": "Collection of setup scripts to install various security research tools.", "stars": "7k"}, {"name": "LazyKali", "url": "https://github.com/jlevitsk/lazykali", "description": "A 2016 refresh of LazyKali which simplifies install of tools and configuration.", "stars": "41"}, {"name": "CTF Field Guide", "url": "https://trailofbits.github.io/ctf/", "description": "Field Guide by Trails of Bits."}, {"name": "CTF Resources", "url": "http://ctfs.github.io/resources/", "description": "Start Guide maintained by community."}, {"name": "How to Get Started in CTF", "url": "https://www.endgame.com/blog/how-get-started-ctf", "description": "Short guideline for CTF beginners by Endgame"}, {"name": "Intro. to CTF Course", "url": "https://www.hoppersroppers.org/courseCTF.html", "description": "A free course that teaches beginners the basics of forensics, crypto, and web-ex."}, {"name": "IppSec", "url": "https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA", "description": "Video tutorials and walkthroughs of popular CTF platforms."}, {"name": "LiveOverFlow", "url": "https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w", "description": "Video tutorials on Exploitation."}, {"name": "MIPT CTF", "url": "https://github.com/xairy/mipt-ctf", "description": "A small course for beginners in CTFs (in Russian).", "stars": "250"}, {"name": "Backdoor", "url": "https://backdoor.sdslabs.co/", "description": "Security Platform by SDSLabs."}, {"name": "Crackmes", "url": "https://crackmes.one/", "description": "Reverse Engineering Challenges."}, {"name": "CryptoHack", "url": "https://cryptohack.org/", "description": "Fun cryptography challenges."}, {"name": "echoCTF.RED", "url": "https://echoctf.red/", "description": "Online CTF with a variety of targets to attack."}, {"name": "Exploit Exercises", "url": "https://exploit-exercises.lains.space/", "description": "Variety of VMs to learn variety of computer security issues."}, {"name": "Exploit.Education", "url": "http://exploit.education", "description": "Variety of VMs to learn variety of computer security issues."}, {"name": "Gracker", "url": "https://github.com/Samuirai/gracker", "description": "Binary challenges having a slow learning curve, and write-ups for each level.", "stars": "4"}, {"name": "Hack The Box", "url": "https://www.hackthebox.eu", "description": "Weekly CTFs for all types of security enthusiasts."}, {"name": "Hack This Site", "url": "https://www.hackthissite.org/", "description": "Training ground for hackers."}, {"name": "Hacker101", "url": "https://www.hacker101.com/", "description": "CTF from HackerOne"}, {"name": "Hacking-Lab", "url": "https://hacking-lab.com/", "description": "Ethical hacking, computer network and security challenge platform."}, {"name": "Hone Your Ninja Skills", "url": "https://honeyourskills.ninja/", "description": "Web challenges starting from basic ones."}, {"name": "IO", "url": "http://io.netgarage.org/", "description": "Wargame for binary challenges."}, {"name": "Microcorruption", "url": "https://microcorruption.com", "description": "Embedded security CTF."}, {"name": "Over The Wire", "url": "http://overthewire.org/wargames/", "description": "Wargame maintained by OvertheWire Community."}, {"name": "PentesterLab", "url": "https://pentesterlab.com/", "description": "Variety of VM and online challenges (paid)."}, {"name": "PicoCTF", "url": "https://2019game.picoctf.com", "description": "All year round ctf game. Questions from the yearly picoCTF competition."}, {"name": "PWN Challenge", "url": "http://pwn.eonew.cn/", "description": "Binary Exploitation Wargame."}, {"name": "Pwnable.kr", "url": "http://pwnable.kr/", "description": "Pwn Game."}, {"name": "Pwnable.tw", "url": "https://pwnable.tw/", "description": "Binary wargame."}, {"name": "Pwnable.xyz", "url": "https://pwnable.xyz/", "description": "Binary Exploitation Wargame."}, {"name": "Reversin.kr", "url": "http://reversing.kr/", "description": "Reversing challenge."}, {"name": "Ringzer0Team", "url": "https://ringzer0team.com/", "description": "Ringzer0 Team Online CTF."}, {"name": "Root-Me", "url": "https://www.root-me.org/", "description": "Hacking and Information Security learning platform."}, {"name": "ROP Wargames", "url": "https://github.com/xelenonz/game", "description": "ROP Wargames.", "stars": "20"}, {"name": "SANS HHC", "url": "https://holidayhackchallenge.com/past-challenges/", "description": "Challenges with a holiday theme"}, {"name": "SmashTheStack", "url": "http://smashthestack.org/", "description": "A variety of wargames maintained by the SmashTheStack Community."}, {"name": "Viblo CTF", "url": "https://ctf.viblo.asia", "description": "Various amazing CTF challenges, in many different categories. Has both Practice mode and Contest mode."}, {"name": "VulnHub", "url": "https://www.vulnhub.com/", "description": "VM-based for practical in digital security, computer application & network administration."}, {"name": "W3Challs", "url": "https://w3challs.com", "description": "A penetration testing training platform, which offers various computer challenges, in various categories."}, {"name": "WebHacking", "url": "http://webhacking.kr", "description": "Hacking challenges for web."}, {"name": "Damn Vulnerable Web Application", "url": "http://www.dvwa.co.uk/", "description": "PHP/MySQL web application that is damn vulnerable."}, {"name": "Juice Shop CTF", "url": "https://github.com/bkimminich/juice-shop-ctf", "description": "Scripts and tools for hosting a CTF on [OWASP Juice Shop](https://www.owasp.org/index.php/OWASP_Juice_Shop_Project) easily.", "stars": "317"}, {"name": "Awesome CTF Cheatsheet", "url": "https://github.com/uppusaikiran/awesome-ctf-cheatsheet#awesome-ctf-cheatsheet-", "description": "CTF Cheatsheet."}, {"name": "CTF Time", "url": "https://ctftime.org/", "description": "General information on CTF occuring around the worlds."}, {"name": "Reddit Security CTF", "url": "http://www.reddit.com/r/securityctf", "description": "Reddit CTF category."}, {"name": "Bamboofox", "url": "https://bamboofox.github.io/", "description": "Chinese resources to learn CTF."}, {"name": "bi0s Wiki", "url": "https://teambi0s.gitlab.io/bi0s-wiki/", "description": "Wiki from team bi0s."}, {"name": "CTF Cheatsheet", "url": "https://uppusaikiran.github.io/hacking/Capture-the-Flag-CheatSheet/", "description": "CTF tips and tricks."}, {"name": "ISIS Lab", "url": "https://github.com/isislab/Project-Ideas/wiki", "description": "CTF Wiki by Isis lab.", "stars": "379"}, {"name": "OpenToAll", "url": "https://github.com/OpenToAllCTF/Tips", "description": "CTF tips by OTA CTF team members.", "stars": "122"}, {"name": "0e85dc6eaf", "url": "https://github.com/0e85dc6eaf/CTF-Writeups", "description": "Write-ups for CTF challenges by 0e85dc6eaf", "stars": "83"}, {"name": "Captf", "url": "http://captf.com/", "description": "Dumped CTF challenges and materials by psifertex."}, {"name": "CTF write-ups (community)", "url": "https://github.com/ctfs/", "description": "CTF challenges + write-ups archive maintained by the community."}, {"name": "CTFTime Scrapper", "url": "https://github.com/abdilahrf/CTFWriteupScrapper", "description": "Scraps all writeup from CTF Time and organize which to read first.", "stars": "27"}, {"name": "HackThisSite", "url": "https://github.com/HackThisSite/CTF-Writeups", "description": "CTF write-ups repo maintained by HackThisSite team.", "stars": "216"}, {"name": "Mzfr", "url": "https://github.com/mzfr/ctf-writeups/", "description": "CTF competition write-ups by mzfr", "stars": "109"}, {"name": "pwntools writeups", "url": "https://github.com/Gallopsled/pwntools-write-ups", "description": "A collection of CTF write-ups all using pwntools.", "stars": "458"}, {"name": "SababaSec", "url": "https://github.com/SababaSec/ctf-writeups", "description": "A collection of CTF write-ups by the SababaSec team", "stars": "15"}, {"name": "Shell Storm", "url": "http://shell-storm.org/repo/CTF/", "description": "CTF challenge archive maintained by Jonathan Salwan."}, {"name": "Smoke Leet Everyday", "url": "https://github.com/smokeleeteveryday/CTF_WRITEUPS", "description": "CTF write-ups repo maintained by SmokeLeetEveryday team.", "stars": "180"}]}, {"name": "LICENSE", "parent": "Writeups Collections", "entries": []}]}