D4stiny / CyberPatriot-DecryptLinks
Decrypts encrypted scoring data of the CyberPatriot Scoring Engine.
☆20Updated 6 years ago
Alternatives and similar repositories for CyberPatriot-Decrypt
Users that are interested in CyberPatriot-Decrypt are comparing it to the libraries listed below
Sorting:
- A bash script used for the Linux Ubuntu machine during the Cyber Patriot security competition.☆22Updated 7 years ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆16Updated 7 years ago
- We store attacks and exploits that we've found useful in our research☆13Updated 10 years ago
- Cyber Patriot scripts for the IX competition.☆80Updated 6 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Updated 7 years ago
- Cyberpatriot born Windows hardening script. It serves as a way to get to baseline and can help specialists further secure the machine.☆32Updated 2 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- This is a poor-mans framework to automate the creation of a CTFd instance, dynamically recreating challenges and the interface.☆10Updated 5 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆40Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆49Updated 7 years ago
- Source codes of malwares, stress tests etc. for computer.☆37Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆30Updated 8 years ago
- Full malware Kit☆57Updated 4 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Updated 9 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆32Updated 6 years ago
- My public exploit collection.☆32Updated 6 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Updated 6 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated 10 months ago
- ☆35Updated 6 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆15Updated 8 years ago
- Discord botnet bot written in python☆10Updated 8 years ago
- Password list character frequency analyzer that can output hashcat masks☆17Updated 6 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Windows Malware monitors and infects specific kinds of files.☆17Updated 5 years ago