RITSPARSA / ISTS16Links
A collection of repositories used to make ISTS 16 possible.
☆15Updated 7 years ago
Alternatives and similar repositories for ISTS16
Users that are interested in ISTS16 are comparing it to the libraries listed below
Sorting:
- Scoring Engine for Red/White/Blue Team Competitions☆129Updated this week
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 4 months ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- A repo full of example gscripts☆100Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 6 years ago
- Run commands on linux through those pesky firewalls☆26Updated 10 years ago
- Python script to decode common encoded PowerShell scripts☆216Updated 7 years ago
- Pypykatz server☆125Updated 6 years ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 8 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- A list of published research documents☆245Updated last year
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- Page File analysis tools.☆128Updated 9 years ago
- ☆108Updated 8 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆397Updated last year
- Miscellaneous Malware RE☆196Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 5 years ago
- A repository of Labs and other information for learning how PowerShell can help with infosec☆17Updated 9 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆289Updated 8 years ago