What is mkCTF

HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.

This framework is designed to assist...

This framework is designed to assist your team in creating jeopardy CTF challenges. It uses a configurable structure that facilitates efficient integration and deployment within the CTF infrastructure.

This project was initially created for INS'hAck 2017

This project was originally developed to manage the challenges for INS'hAck 2017. In this repository, you can find the challenges and write-ups from previous editions of INS'hAck.

This project evolved over time to enhance automation

This project has developed over time to facilitate greater automation when deploying challenges on a Rancher-based infrastructure. Caution: Your mkCTF repository must remain private until the CTF event concludes.

It stores flags in plaintext to facilitate challenge reconstruction

It stores flags in plaintext, enabling CTF admins to recreate challenges from their original sources without the need to generate new flags.

It might work on Darwin and WSL...

It might work on Darwin and also on Windows Subsystem for Linux (WSL). The other dependencies will vary based on the specific challenges you encounter. Setup: You can set up mkCTF in just a few steps: curl -o setup.sh https://raw.githubusercontent.com/koromodako/mkctf/m
 

mkCTF Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with mkCTF tool and help others make informed decisions.

Featured

Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development

Similar Tools

getallurls (gau)
Free

getallurls (gau) View getallurls (gau)

Catch up on the latest cybersecurity news and updates from around the world.

Guardey
Free

Guardey View Guardey

Guardey delivers enterprise-grade cybersecurity solutions tailored for small and medium-sized businesses, ensuring robust protection for your workforce across all operational environments – office, home, or remote. Our platform leverages advanced VPN technology to create an encrypted tunnel for your internet traffic, guaranteeing privacy and anonymity. Simultaneously, our intelligent cyber alarm continuously analyzes network activity, adapting every 15 minutes to detect and neutralize emerging threats.

Enterprise-grade cybersecurity for SMEs
Secure VPN encryption for all internet traffic
Real-time threat detection and analysis
Zero Online Banking
Free

Zero Online Banking View Zero Online Banking

Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

YARA package for Sublime Text
Free

YARA package for Sublime Text View YARA package for Sublime Text

Cybersecurity conference featuring talks on various hacking topics by industry experts.

YARA-sort
Free

YARA-sort View YARA-sort

A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.

WPMissionControl
Free

WPMissionControl View WPMissionControl

A scalable python framework for security research and development teams.