BSidesPDX / CTF-2018
☆19Updated 6 years ago
Alternatives and similar repositories for CTF-2018:
Users that are interested in CTF-2018 are comparing it to the libraries listed below
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 8 years ago
- Scoring Engine for CTF competitions☆46Updated last year
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- 504 VSAgent☆23Updated 6 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆89Updated 5 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- ☆17Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- ☆17Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- BSidesPDX CTF 2017☆11Updated 7 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 7 months ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Repo for MIRR Workshop Heroku app☆51Updated 4 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago