RITSPARSA / ISTS16Links
A collection of repositories used to make ISTS 16 possible.
☆15Updated 7 years ago
Alternatives and similar repositories for ISTS16
Users that are interested in ISTS16 are comparing it to the libraries listed below
Sorting:
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 8 months ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated 3 weeks ago
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Pypykatz server☆125Updated 6 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆103Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- A repo full of example gscripts☆102Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 7 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆400Updated last year
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- A list of published research documents☆247Updated last year
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆91Updated 9 months ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- 504 VSAgent☆25Updated 7 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆135Updated 3 years ago
- Competition Infrastructure Management☆87Updated 4 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Updated 7 years ago
- ☆113Updated 8 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- A command line tool for creating malicious outlook rules☆165Updated 7 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Page File analysis tools.☆129Updated 10 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago