CTFCircle / CTF-Circle-Resources
CTF-Circle Resources for CTFs and other things
☆15Updated 6 years ago
Alternatives and similar repositories for CTF-Circle-Resources:
Users that are interested in CTF-Circle-Resources are comparing it to the libraries listed below
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 6 months ago
- ☆26Updated 7 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 8 months ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- The documents☆55Updated 7 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆77Updated 6 years ago
- penetration testing scripts☆137Updated 5 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆99Updated 2 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆66Updated 7 years ago
- "Honey" document generator for beacon document tracking.☆56Updated 6 years ago
- ☆52Updated 6 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆90Updated 5 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- 504 VSAgent☆23Updated 7 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago