Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆31Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆51Updated 2 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- autopwn + deployment☆15Updated 3 years ago
- A repo to support the book☆108Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆64Updated last year
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- A memorial site for Hackers and Infosec people who have passed☆138Updated 2 weeks ago
- Tools that trigger False Positive AV alerts☆50Updated 8 months ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Posts about different topics☆38Updated last week
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 10 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆46Updated 4 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆119Updated 2 years ago
- SNIcat☆127Updated 4 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated last year