CUCyber / hackpackLinks
competition hackpack used by CU Cyber
☆22Updated 3 years ago
Alternatives and similar repositories for hackpack
Users that are interested in hackpack are comparing it to the libraries listed below
Sorting:
- presentations given by CU Cyber☆15Updated 4 years ago
- Challenges used in CUCTF 2019☆25Updated 5 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- Resources for PCDC and SECCDC competitions☆8Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A tool for netpens.☆37Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Misc malware stuff☆11Updated 4 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆86Updated 6 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Updated 8 years ago
- meterpreter connetion☆22Updated 7 years ago
- Reading List for CSIRT Team Members☆17Updated 5 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆12Updated 7 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 10 years ago
- ☆15Updated 10 years ago
- My OSCP report template in LaTex☆25Updated 5 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- ☆23Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 9 months ago