Blackslashtech / glitch
General purpose attack-defense range for zero-config deployment
☆23Updated last month
Alternatives and similar repositories for glitch:
Users that are interested in glitch are comparing it to the libraries listed below
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆18Updated 9 months ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆13Updated last year
- ☆35Updated 3 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆96Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- 🧞♂️ malware analysis☆34Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated last month
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆94Updated 2 weeks ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated 8 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 6 months ago
- Collection of codes focused on Linux rootkits☆95Updated last month
- slides for talk given during uscg 2023 combine☆37Updated last year
- ☆127Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆52Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆149Updated 4 months ago
- ☆105Updated 8 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 9 months ago
- examples of using radius2 to solve reversing challenges☆34Updated 2 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆140Updated 7 months ago
- ☆147Updated last year
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- An automatic Blind ROP exploitation tool☆201Updated last year
- A curated list of resources for the OSED journey.☆60Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆215Updated 3 months ago
- Runs exploits, fast.☆81Updated 8 months ago