Kkevsterrr / kothLinks
king of the hill cybersecurity competition
☆30Updated 3 years ago
Alternatives and similar repositories for koth
Users that are interested in koth are comparing it to the libraries listed below
Sorting:
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆62Updated 11 months ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated last year
- autopwn + deployment☆15Updated 3 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆18Updated last year
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆58Updated 7 months ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆36Updated 3 weeks ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 7 months ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ☆24Updated last year
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- ☆79Updated 5 years ago
- Red team oriented key finder and correlator☆19Updated last week
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago