BYU-CCDC / public-ccdc-resourcesLinks
☆13Updated last week
Alternatives and similar repositories for public-ccdc-resources
Users that are interested in public-ccdc-resources are comparing it to the libraries listed below
Sorting:
- General purpose attack-defense range for zero-config deployment☆39Updated last month
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Updated last year
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated 10 months ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Repository to index useful tools for CTF's☆28Updated 3 weeks ago
- A script to download all the challenges and files from the CTFd instance.☆61Updated 6 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆28Updated last year
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 3 months ago
- Challenges and writeups for PatriotCTF 2023☆25Updated 2 years ago
- ☆35Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 9 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆162Updated last year
- Repo of RIT CCDC Team Scripts☆14Updated 3 years ago
- SNMPv3 Authentication Bruteforcer☆38Updated 4 years ago
- Rust-based linux reverse shell listener.☆12Updated last year
- CTFd plugin allowing for individual Docker containers per team☆22Updated 3 months ago
- Runs exploits, fast.☆106Updated 2 months ago
- Automated security lab provisioning☆85Updated last month
- ☆118Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆115Updated 4 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆226Updated last year
- A better netcat for Hackers☆31Updated 3 weeks ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆246Updated 3 weeks ago
- knowledge is power☆229Updated 4 months ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆21Updated 5 years ago
- Tuoni☆202Updated 3 weeks ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆86Updated 2 years ago
- Network analysis tool for Attack Defence CTF☆406Updated 2 months ago
- Web interface to explore Suricata EVE outputs☆84Updated 3 weeks ago
- High Octane Triage Analysis☆805Updated this week