Kkevsterrr / koth
king of the hill cybersecurity competition
☆27Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for koth
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆44Updated last year
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- Quick script to find info about a syscall in a target architecture☆18Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆23Updated last year
- Resources I've found helpful for learning computing security.☆14Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Posts about different topics☆36Updated 8 months ago
- Basic tutorials for reverse engineer with radare2☆61Updated 5 years ago
- Malware similarity platform with modularity in mind.☆76Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last month
- ☆47Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- ☆36Updated 6 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 5 years ago
- ☆36Updated 2 weeks ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆28Updated 8 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 3 months ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated this week
- ☆68Updated 3 years ago