CyberForceProgram / 2024_CyberForce_CompetitionLinks
☆49Updated last year
Alternatives and similar repositories for 2024_CyberForce_Competition
Users that are interested in 2024_CyberForce_Competition are comparing it to the libraries listed below
Sorting:
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆27Updated 3 weeks ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated 10 months ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆646Updated this week
- ☆49Updated last month
- Challenges for the DoD Cyber Challenge C1 CTF☆16Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,237Updated 5 months ago
- Labs for Practical Malware Analysis & Triage☆1,058Updated 2 weeks ago
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆519Updated 3 weeks ago
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆569Updated this week
- Gets updates from various clearnet domains and ransomware threat actor domains☆411Updated last year
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,071Updated last week
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆24Updated 4 months ago
- ☆49Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆151Updated last year
- Infrastructure Automation☆359Updated last year
- A GUI and CLI tool for removing bloat from executables☆437Updated 6 months ago
- A mostly-serverless distributed hash cracking platform☆644Updated 3 weeks ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,377Updated last year
- Purple Team Exercise Framework☆759Updated 2 years ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆999Updated last week
- Bloodhound Reporting for Blue and Purple Teams☆1,258Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆445Updated last year
- ScriptSentry finds misconfigured and dangerous logon scripts.☆618Updated last year
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- ☆514Updated 2 years ago
- President's Cup Cybersecurity Competition Challenges☆192Updated 4 months ago
- Tuoni☆205Updated this week
- An offensive data enrichment pipeline☆882Updated this week
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,728Updated 2 months ago
- 🔐 Vulnerability remediation scoring system☆128Updated 2 years ago