JoshuaTatum / cyberpatriotLinks
A bash script used for the Linux Ubuntu machine during the Cyber Patriot security competition.
☆22Updated 7 years ago
Alternatives and similar repositories for cyberpatriot
Users that are interested in cyberpatriot are comparing it to the libraries listed below
Sorting:
- Cyber Patriot scripts for the IX competition.☆85Updated 6 years ago
- Cyberpatriot Scoring Engine: Linux☆15Updated 4 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Updated 8 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Updated 9 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- LIFARS Networking Security GNU/Linux distro☆27Updated 7 years ago
- Detect hidden files and text in images☆121Updated 2 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- A malicious captive wifi portal☆147Updated 5 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 7 years ago
- Collection of some Scripts that I have created for the CyberPatriot Competition☆17Updated 8 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 2 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Python framework to scrape Pastebin pastes and analyze them☆127Updated 6 months ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 10 years ago
- CTF designed for Middle School-aged kids☆11Updated last year
- A simple capture the flag framework.☆124Updated 8 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆17Updated 4 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- Distributed Honeypot☆63Updated 7 years ago
- Some exploits and exploit development stuff.☆150Updated 3 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation☆135Updated 3 weeks ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago