Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆30Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆51Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆28Updated 11 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 9 months ago
- Tools that trigger False Positive AV alerts☆50Updated 7 months ago
- ☆63Updated last year
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- A repo to support the book☆108Updated 4 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 3 months ago
- Collection of red machine learning projects☆40Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- autopwn + deployment☆15Updated 3 years ago
- SNIcat☆127Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- ☆79Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆54Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- ☆116Updated 3 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago