BreizhCTF / breizhctf-2024
Breizh CTF 2024 - Challenges
☆14Updated 9 months ago
Alternatives and similar repositories for breizhctf-2024:
Users that are interested in breizhctf-2024 are comparing it to the libraries listed below
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 6 months ago
- BreizhCTF 2023 - Challenges☆27Updated 2 years ago
- Web interface to explore Suricata EVE outputs☆50Updated 3 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated last month
- Osint tool to recover authors and emails on GitHub☆11Updated 9 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 4 months ago
- ☆44Updated 3 years ago
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Updated 5 months ago
- Outil de sécurité des architectures kubernetes avancées☆50Updated 4 months ago
- Python tool to check rootkits in Windows kernel☆195Updated last month
- My personal OT resource list, gather throughout research and internet adventure.☆70Updated this week
- ☆89Updated 2 weeks ago
- ☆51Updated 5 months ago
- Search engine for CTF writeups with instant results.☆129Updated 3 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- ☆92Updated last week
- ☆55Updated 5 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 4 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- 🧞♂️ malware analysis☆34Updated last year
- A script to download all the challenges and files from the CTFd instance.☆55Updated 8 months ago
- VM Lab for security☆9Updated last year
- Lab used for workshop and CTF☆175Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆54Updated 3 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆59Updated 3 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆149Updated 4 months ago
- Collection of codes focused on Linux rootkits☆95Updated last month