RITSPARSA / ISTS16Links
A collection of repositories used to make ISTS 16 possible.
☆15Updated 7 years ago
Alternatives and similar repositories for ISTS16
Users that are interested in ISTS16 are comparing it to the libraries listed below
Sorting:
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 7 months ago
- Scoring Engine for Red/White/Blue Team Competitions☆132Updated last week
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Competition Infrastructure Management☆87Updated 3 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- Run commands on linux through those pesky firewalls☆28Updated 10 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆399Updated last year
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- CCDC Red Team PWNboard☆76Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆259Updated 4 years ago
- ☆54Updated 5 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 6 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Updated 7 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 7 years ago
- Page File analysis tools.☆128Updated 9 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆95Updated 8 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- A repo full of example gscripts☆100Updated 6 years ago
- ☆17Updated 5 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 2 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago