RITSPARSA / ISTS16
A collection of repositories used to make ISTS 16 possible.
☆15Updated 7 years ago
Alternatives and similar repositories for ISTS16:
Users that are interested in ISTS16 are comparing it to the libraries listed below
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- Competition Infrastructure Management☆87Updated 3 years ago
- CCDC Red Team PWNboard☆77Updated 7 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- The documents☆56Updated 7 years ago
- autopwn + deployment☆15Updated 3 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆128Updated this week
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- ☆59Updated 5 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- ☆58Updated 4 years ago
- ☆76Updated 6 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- ☆17Updated 5 years ago
- 504 VSAgent☆23Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Setup script for Red Teams☆14Updated 2 weeks ago
- ☆114Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 3 years ago
- ☆41Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago