RITSPARSA / ISTS16Links
A collection of repositories used to make ISTS 16 possible.
☆15Updated 7 years ago
Alternatives and similar repositories for ISTS16
Users that are interested in ISTS16 are comparing it to the libraries listed below
Sorting:
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 8 months ago
- Scoring Engine for Red/White/Blue Team Competitions☆133Updated last week
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆103Updated 3 years ago
- Competition Infrastructure Management☆87Updated 4 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 7 years ago
- ☆19Updated 7 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 8 years ago
- Page File analysis tools.☆129Updated 10 years ago
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- A repo full of example gscripts☆102Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆135Updated 3 years ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆240Updated 2 years ago
- ☆17Updated 6 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- ☆113Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- ☆108Updated 8 years ago
- A list of published research documents☆247Updated last year
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 6 years ago