Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆32Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆53Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated 11 months ago
- ☆64Updated last year
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- A repo to support the book☆110Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Collection of red machine learning projects☆41Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 2 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- Vulnerabilities, exploits, and PoCs☆37Updated last week
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- ☆117Updated 7 months ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆88Updated 4 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
- ☆44Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Posts about different topics☆40Updated 3 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago