RITSPARSA / ISTS16Links
A collection of repositories used to make ISTS 16 possible.
☆15Updated 7 years ago
Alternatives and similar repositories for ISTS16
Users that are interested in ISTS16 are comparing it to the libraries listed below
Sorting:
- Notes, Slides, Comments and Commands on How to Win CCDC☆137Updated 10 months ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated last week
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Competition Infrastructure Management☆88Updated 4 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- A repo full of example gscripts☆102Updated 6 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- Run commands on linux through those pesky firewalls☆28Updated 10 years ago
- Pypykatz server☆125Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 5 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆149Updated 3 years ago
- 504 VSAgent☆25Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- Resources I've found helpful for learning computing security.☆14Updated 6 years ago
- Encrypted exploit delivery for the masses☆270Updated 6 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 8 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Updated 7 years ago
- A repository of Labs and other information for learning how PowerShell can help with infosec☆17Updated 10 years ago
- ☆113Updated 8 years ago
- ☆54Updated 5 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Respounder detects presence of responder in the network.☆321Updated 6 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆402Updated last year