Kkevsterrr / koth
king of the hill cybersecurity competition
☆27Updated 2 years ago
Alternatives and similar repositories for koth:
Users that are interested in koth are comparing it to the libraries listed below
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- ☆47Updated last year
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Vulnerabilities, exploits, and PoCs☆35Updated last month
- Collection of red machine learning projects☆39Updated 3 years ago
- Radare2 Metadata Extraction to Elasticsearch☆21Updated 7 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- wordlists for password cracking☆25Updated 2 years ago
- Custom SOCKS proxy for redteam☆12Updated 2 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- autopwn + deployment☆15Updated 2 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆46Updated last year
- C# User Simulation☆32Updated 2 years ago
- ☆59Updated 6 months ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- Raw socket library/framework for red team events☆35Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Exfiltration based on custom X509 certificates☆26Updated 10 months ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- Various capabilities for static malware analysis.☆75Updated 4 months ago
- Port of "watershell" made by an alumni (wumb0) that I decided to port to C++☆17Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year