🛡️ Enhance cybersecurity with SubgroupX, a specialized AI Agent utilizing geometric tactics for effective CTF, penetration testing, and active defense.
-
Updated
Feb 8, 2026 - JavaScript
🛡️ Enhance cybersecurity with SubgroupX, a specialized AI Agent utilizing geometric tactics for effective CTF, penetration testing, and active defense.
🧪 Explore mobile security with Frida Reversing Lab, a toolkit for analyzing and manipulating Android apps to overcome obfuscation and security barriers.
A unified, interactive reference for Living Off The Land Binaries (LOLBAS & GTFOBins). Features a dynamic payload builder (LHOST/LPORT), real-time search, MITRE ATT&CK mapping, and auto-updates from official sources.
LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling your first exploit or have professional experience, there will be challenges just right for you!
Platform for LA CTF. Forked from redpwn/rctf.
We’re an open-source cyber CTF platform that’s forever free and built for builders, hackers, and learners. Our vibrant community makes learning modern security techniques fun, challenging, and hands-on.
Discover hidden debugging parameters and uncover web application secrets
Run Capture the Flags and Security Trainings with OWASP WrongSecrets
A collection of mobile (Android & iOS) CTF challenges and write-ups from 2025 onwards.
Reverse Engineering Online Toolkit (REOT) 是一个基于纯前端实现的在线逆向工程与爬虫工具箱。本项目旨在为安全研究人员、逆向工程师、爬虫工程师和开发者提供一套便捷、高效、无需安装的在线工具集合,用于处理逆向工程期间常见的编码、解码、加密、解密、数据转换等操作。
Interactive cyber range / CTF-style web game about defending a power grid from ransomware
A universal Frida Script that prevents application self-termination at Java and native layers on Android.
正规子群.AI Agent | SubgroupX: A high-performance AI Agent for offensive security, Coding, CTF operations, and active defense protocols. Architected by Normal Subgroup. 邀请测试阶段中
Web interface to explore Suricata EVE outputs
A GitHub Actions Supply Chain CTF / Goat
🏦 AI Security Training Game - Can you breach the AI vault?
React2Shell CVE-2025-55182: unauthenticated unsafe deserialization in React Server Components leading to reliable remote code execution via the Flight protocol.
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."