CUCyber / hackpackLinks
competition hackpack used by CU Cyber
☆21Updated 3 years ago
Alternatives and similar repositories for hackpack
Users that are interested in hackpack are comparing it to the libraries listed below
Sorting:
- presentations given by CU Cyber☆14Updated 5 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated this week
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 10 months ago
- for the louise☆245Updated 5 years ago
- Scoreboard for Capture The Flag competitions.☆173Updated 3 years ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Updated 12 years ago
- ☆147Updated 9 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Automated pshtt, trustymail, and sslyze scanning☆28Updated last month
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆242Updated 3 months ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆83Updated 2 years ago
- AHA! Website Source☆19Updated this week
- ☆238Updated 5 years ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- Get your APT on using social media as a tool for data exfiltration.☆149Updated 3 years ago
- ☆384Updated 13 years ago
- ID-spoofing NFS client☆299Updated 6 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- ☆425Updated 8 years ago
- DEF CON Hacker Tracker☆110Updated 3 years ago
- ☆235Updated 6 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Updated 9 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- password cracking front end☆57Updated 5 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Updated 2 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- ☆194Updated last year