CyberForceProgram / 2025_CyberForce_CompetitionLinks
☆49Updated last week
Alternatives and similar repositories for 2025_CyberForce_Competition
Users that are interested in 2025_CyberForce_Competition are comparing it to the libraries listed below
Sorting:
- Labs for Practical Malware Analysis & Triage☆1,044Updated 7 months ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆101Updated last week
- ☆50Updated last year
- Windows Local Privilege Escalation Cookbook☆1,213Updated 10 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆769Updated last week
- This repository dedicated to collect SIEM practice labs (Splunk and Elastic) from various cybersecurity training platforms☆34Updated 3 weeks ago
- Challenges for the DoD Cyber Challenge C1 CTF☆15Updated last year
- Obsidian Notes used to passed the OSCP exam and most HTB machines / challenges.☆38Updated 6 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆674Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆409Updated last year
- Practical Windows Forensics Training☆699Updated last year
- ⚠️ malware development☆631Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,115Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆771Updated last year
- Describing and documenting the process of deploying a HomeLab for security research and training☆41Updated 6 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆382Updated 3 months ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆233Updated last month
- A resource containing all the tools each ransomware gangs uses☆1,281Updated last month
- Orange Cyberdefense mindmaps☆1,484Updated 8 months ago
- Pure Malware Development Resource Collections☆398Updated 11 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆924Updated 4 years ago
- A curated list of awesome Memory Forensics for DFIR☆501Updated 9 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,228Updated 2 weeks ago
- Malware Development for Ethical Hackers, published by Packt☆408Updated last month
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,725Updated last month
- President's Cup Cybersecurity Competition Challenges☆190Updated 3 months ago
- C2 infrastructure over Microsoft Teams.☆730Updated 10 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆724Updated 6 months ago
- A workshop about Malware Development☆1,726Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,381Updated 2 weeks ago