C0nd4 / CCDC-Blueteam-ManualView external linksLinks
☆18Feb 11, 2021Updated 5 years ago
Alternatives and similar repositories for CCDC-Blueteam-Manual
Users that are interested in CCDC-Blueteam-Manual are comparing it to the libraries listed below
Sorting:
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Mar 5, 2019Updated 6 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- A tool to integrate post-quantum secure TLS in NGINX using OpenSSL☆11Nov 15, 2021Updated 4 years ago
- ☆14Nov 16, 2024Updated last year
- Angular Personal Resume And Portfolio Template☆10Jan 29, 2026Updated 2 weeks ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Docker Image for running Squid Proxy☆11Jan 15, 2018Updated 8 years ago
- Building an Automated Perimeter Scanning System with Open Source Tools - NMAP, IVRE and Netbox☆13May 5, 2023Updated 2 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 weeks ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Working files for the Docker and Kubernetes course from Udemy taught by Stephen Grider (StephenGrider)☆13Jan 25, 2023Updated 3 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Nov 5, 2020Updated 5 years ago
- Wrappers for testing command parameters☆14Oct 22, 2018Updated 7 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Vör is a set of services for gathering metrics by polling systems and delivering them to graphite.☆48Mar 7, 2018Updated 7 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- ☆14May 1, 2018Updated 7 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- FPGA implementation of SKLearn Random Forest☆10Dec 12, 2016Updated 9 years ago