Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆31Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 6 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- ☆64Updated last year
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 weeks ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- Collection of red machine learning projects☆41Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- A repo to support the book☆112Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- ☆13Updated last year
- Local Privilege Escalation Miner☆32Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- ☆54Updated 2 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- ☆121Updated 3 weeks ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Updated 3 years ago
- Posts about different topics☆39Updated 5 months ago
- Resources I've found helpful for learning computing security.☆14Updated 6 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago