playCTF
nsa-codebreaker-2020
playCTF | nsa-codebreaker-2020 | |
---|---|---|
2 | 4 | |
55 | 74 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | almost 3 years ago | |
Vue | Python | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
playCTF
-
Announcing playCTF - An open source Jeopardy style CTF creation and management platform!
Experience playCTF on the playCTF playground (https://playground-playctf.sdslabs.co), or have a peek at the source code (https://github.com/sdslabs/playctf).
Experience playCTF on the playCTF playground, or have a peek at the source code.
nsa-codebreaker-2020
- luker983/nsa-codebreaker-2020 - solutions to the 2020 NSA Codebreaker Challenge
-
NSA Codebreaker - 2 Days Left
Here are my solutions. If you have any questions feel free to ask them on the Discussions page or pm me!
- NSA Codebreaker Challenge 2020 Solutions
What are some alternatives?
beast - Jeopardy-style CTF challenge deployment and management tool.
XFFF - CTF servers using socket() and No-sql
desktop-app-ui2 - IVPN Desktop app
ofrak - OFRAK: unpack, modify, and repack binaries.
CTFever - Fantastic toolkit for CTFers and everyone.
xepor - Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
hackthebox-writeups - Writeups for HacktheBox 'boot2root' machines
tryhackme-writeups - Write-Ups for TryHackMe
Digital-Forensics-Guide - Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
write-ups
Crypton - Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs