Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆32Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
 - A repo to support the book☆110Updated 4 years ago
 - A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
 - Tools that trigger False Positive AV alerts☆53Updated 10 months ago
 - Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
 - BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
 - ☆52Updated 2 years ago
 - Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated last year
 - ☆116Updated 6 months ago
 - ☆64Updated last year
 - Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
 - labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
 - A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
 - Red team oriented key finder and correlator☆20Updated 3 months ago
 - A memorial site for Hackers and Infosec people who have passed☆136Updated last month
 - Collection of red machine learning projects☆41Updated 4 years ago
 - Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
 - Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
 - ☆69Updated 4 years ago
 - MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
 - Posts about different topics☆40Updated 2 months ago
 - It records your screenshots and code, then lets you upload to ASHIRT☆56Updated 2 weeks ago
 - This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
 - Resources I've found helpful for learning computing security.☆14Updated 5 years ago
 - Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
 - Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
 - Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
 - Python API for interacting with sigma rules.☆54Updated 3 years ago
 - Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
 - Code snippets for bare-metal malware development☆98Updated 3 years ago