Cyber competition scoring engine
☆17Jun 15, 2016Updated 9 years ago
Alternatives and similar repositories for cyberengine
Users that are interested in cyberengine are comparing it to the libraries listed below
Sorting:
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆135Updated this week
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- CSH Evals, the modern way.☆12Updated this week
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Updated this week
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- System Technology Accounting and Resource Registration Solution☆16Apr 30, 2021Updated 4 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Scoring Engine for CTF competitions☆48Feb 15, 2023Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated last month
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Install your remote server for the Lamassu Cryptomat☆18Feb 16, 2026Updated 2 weeks ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Interactive directory of FOSS@RIT community members generated from YAML profiles and built with Jekyll☆11Apr 12, 2023Updated 2 years ago
- The Second Version of Car Demo☆12Jan 6, 2023Updated 3 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago