This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges
☆18Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Defenders
Users that are interested in Cyber-Defenders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- 安全基线☆19Jul 23, 2021Updated 4 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆30Jan 13, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Leetcode solutions☆15Dec 24, 2025Updated 3 months ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- 《FanZhi-攻击与反制的艺术》☆67Dec 8, 2023Updated 2 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- A guide to setting up Windows and MacOS the way I like it☆22Jun 25, 2025Updated 9 months ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆14Sep 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?☆13Nov 12, 2023Updated 2 years ago
- Improve keychain_dumper by adding the functionality to fetch certificates and keys stored in iOS keychain☆16Jun 11, 2018Updated 7 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 2 months ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year
- ☆17Feb 15, 2023Updated 3 years ago
- A simple, commented and readable python implementation of ChaCha, Salsa, Poly1305, MD2, MD4, MD5, SHA1, SHA2, SHA3, Blake, Blake2, DES, 3…☆10Aug 10, 2024Updated last year
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- ctf challenge solutions☆15Jul 28, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆24Mar 8, 2017Updated 9 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆11May 12, 2022Updated 3 years ago
- Script for forensic analysis of the OS X Continuity☆20Jul 7, 2018Updated 7 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 5 months ago
- Simple scraper for automating challenges gathering from a CTFd platform☆48Jun 15, 2020Updated 5 years ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆11Sep 3, 2021Updated 4 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 9 months ago
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- Challenges I've made for public CTFs.☆22Sep 30, 2025Updated 5 months ago
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 3 months ago
- Fork of XCT clean kali install with sprinkling of theGuildHall pwnbox implementation and some love <3.☆11Aug 16, 2023Updated 2 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- ☆35Aug 4, 2018Updated 7 years ago