RigspolitietNC3 / nc3ctf2018
NC3 Jule CTF 2018
☆12Updated 5 years ago
Alternatives and similar repositories for nc3ctf2018:
Users that are interested in nc3ctf2018 are comparing it to the libraries listed below
- #NC3CTF2020 Jule hacker-konkurrence afholdt af Rigspolitiet, NC3☆7Updated 4 years ago
- ☆14Updated last year
- JackIt - Exploit Code for Mousejack☆828Updated 4 years ago
- ☆1,384Updated 3 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆521Updated 11 months ago
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆359Updated 11 years ago
- KEA Diplom i IT-sikkerhed kurser☆12Updated last week
- UAC bypass, Elevate, Persistence methods☆2,656Updated 2 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,381Updated 4 months ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,692Updated 6 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,596Updated 6 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,515Updated 3 months ago
- Hashcat Cheatsheet for OSCP☆603Updated 4 years ago
- Information Security New Zealand - slack☆23Updated last year
- Not an interesting repo.☆26Updated 4 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆493Updated 7 years ago
- Create randomly insecure VMs☆2,660Updated last week
- Learning Shodan through katas☆464Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,003Updated 4 years ago
- Windows Exploit Suggester - Next Generation☆4,325Updated last week
- SIFT☆500Updated last year
- Encoding Tools for Rubber Ducky☆427Updated last year
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,695Updated 3 years ago
- MouseJack device discovery and research tools☆1,316Updated 7 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,786Updated last year
- A £10 Rubber Ducky USB HID! A USB device which emulates a keyboard and automates key entry.☆258Updated 5 years ago
- ☆133Updated 3 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆221Updated last month
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,151Updated 2 weeks ago
- Key and Lock Decoding Tools☆1,120Updated 4 years ago