CyberForceProgram / 2025_CyberForce_CompetitionLinks
☆49Updated 2 months ago
Alternatives and similar repositories for 2025_CyberForce_Competition
Users that are interested in 2025_CyberForce_Competition are comparing it to the libraries listed below
Sorting:
- ☆49Updated last year
- Obsidian Notes used to passed the OSCP exam and most HTB machines / challenges.☆41Updated 8 months ago
- Labs for Practical Malware Analysis & Triage☆1,072Updated last month
- This repository dedicated to collect SIEM practice labs (Splunk and Elastic) from various cybersecurity training platforms☆47Updated last month
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,035Updated 3 weeks ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆107Updated last week
- Describing and documenting the process of deploying a HomeLab for security research and training☆41Updated 9 months ago
- ⚠️ malware development☆680Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,134Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆458Updated last year
- Windows Local Privilege Escalation Cookbook☆1,263Updated last year
- Challenges for the DoD Cyber Challenge C1 CTF☆16Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,296Updated 2 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆416Updated 2 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆149Updated last year
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆254Updated 2 weeks ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆683Updated last year
- A dynamic cheat sheet for PEN-200, OSCP, and other pentests made with Google Sheets☆81Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆794Updated last year
- Malware Development for Ethical Hackers, published by Packt☆438Updated last week
- My attempt at making an obsidian theme☆22Updated 3 weeks ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆446Updated 8 months ago
- C2 infrastructure over Microsoft Teams.☆738Updated last year
- PEN-300 collection to help you on your exam.☆685Updated 5 months ago
- ☆21Updated 2 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆76Updated last year
- Practical Malware Analysis Course☆20Updated 3 years ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- EDR Lab for Experimentation Purposes☆1,409Updated 2 weeks ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,810Updated last year