Kkevsterrr / koth
king of the hill cybersecurity competition
☆27Updated 2 years ago
Alternatives and similar repositories for koth:
Users that are interested in koth are comparing it to the libraries listed below
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- ☆61Updated 9 months ago
- Vulnerabilities, exploits, and PoCs☆35Updated this week
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- autopwn + deployment☆15Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- Red team oriented key finder and correlator☆16Updated last year
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Machine learning enabled dropper☆26Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆49Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆54Updated 5 months ago
- Posts about different topics☆36Updated last year
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 6 months ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- ☆15Updated 2 years ago
- wordlists for password cracking☆27Updated 2 years ago