Cyber Patriot scripts for the IX competition.
☆85Feb 16, 2019Updated 7 years ago
Alternatives and similar repositories for CyberPatriotScripts
Users that are interested in CyberPatriotScripts are comparing it to the libraries listed below
Sorting:
- Different cyberpatriot checklists and scripts I wrote☆59Jan 20, 2018Updated 8 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆32Dec 22, 2016Updated 9 years ago
- A bash script used for the Linux Ubuntu machine during the Cyber Patriot security competition.☆21Dec 4, 2017Updated 8 years ago
- Cyber Patriot automated scripts for 2018-2019 competition. YOU MAY USE THESE SCRIPTS FOR INSPIRATION BUT YOU CANNOT BLATANTLY COPY/PASTE/…☆12Nov 12, 2018Updated 7 years ago
- Cyberpatriot born Windows hardening script. It serves as a way to get to baseline and can help specialists further secure the machine.☆34Mar 30, 2023Updated 2 years ago
- Cyberpatriot Scoring Engine: Linux☆15Mar 17, 2021Updated 4 years ago
- 🔐 Vulnerability remediation scoring system☆130Oct 30, 2023Updated 2 years ago
- Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.☆11Apr 19, 2024Updated last year
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Jul 26, 2024Updated last year
- Notes, Slides, Comments and Commands on How to Win CCDC☆139Mar 30, 2025Updated 11 months ago
- ☆70Dec 4, 2018Updated 7 years ago
- a collection of pdfs i like to read☆25May 25, 2023Updated 2 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Aug 22, 2018Updated 7 years ago
- All-in-one Scoring Engine☆29Updated this week
- ManageEngine OpManager Decryption Tools☆32Sep 6, 2022Updated 3 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- Modeling and simulation of ICS devices☆13Jan 28, 2026Updated last month
- Encrypt and decrypt text with an image☆10Mar 2, 2025Updated last year
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- This repo contains example code which demonstrates how to receive and decode the streamed data of 3D and 2D laser scanners.☆14Sep 27, 2024Updated last year
- Module to update the Krbtgt password☆48Nov 10, 2023Updated 2 years ago
- ☆14Aug 14, 2024Updated last year
- A work-in-progress cyberpunk online role-playing game.☆11May 23, 2017Updated 8 years ago
- Python with a twist of R syntax☆10May 6, 2019Updated 6 years ago
- A Discord Bot Framework☆11Mar 26, 2021Updated 4 years ago
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- A small tool to edit League of Legends files in linux☆36Apr 7, 2015Updated 10 years ago
- ☆11Apr 9, 2024Updated last year
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- ☆10Jul 8, 2014Updated 11 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week