Ryan-Galligher / CyberPatriot
Collection of some Scripts that I have created for the CyberPatriot Competition
☆16Updated 7 years ago
Alternatives and similar repositories for CyberPatriot:
Users that are interested in CyberPatriot are comparing it to the libraries listed below
- Cyber Patriot scripts for the IX competition.☆78Updated 5 years ago
- A bash script used for the Linux Ubuntu machine during the Cyber Patriot security competition.☆22Updated 7 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆22Updated 8 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆21Updated 6 years ago
- Cyberpatriot born Windows hardening script. It serves as a way to get to baseline and can help specialists further secure the machine.☆33Updated last year
- 🔐 Vulnerability remediation scoring system☆118Updated last year
- ☆75Updated 3 years ago
- Cyber Patriot automated scripts for 2018-2019 competition. YOU MAY USE THESE SCRIPTS FOR INSPIRATION BUT YOU CANNOT BLATANTLY COPY/PASTE/…☆12Updated 6 years ago
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆12Updated 2 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆46Updated 7 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆34Updated 6 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆23Updated last month
- Lists of Social Media, News sites, and other things to follow☆41Updated last month
- Cyberpatriots checklists and note resources☆11Updated 8 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆30Updated 8 years ago
- An uploader honeypot designed to look like poor website security.☆27Updated last month
- Web-app to identify the different types of hashes☆20Updated last year
- An analytical framework for network traffic and behavioral analytics☆22Updated last year
- TOP 40 - 1.4 Billion Clear Text Credentials☆26Updated 7 years ago
- This is the network diagrams, configuration guides, and hardware used for my home lab.☆77Updated 6 years ago
- Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.☆9Updated 9 months ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆27Updated this week
- Kaseya REvil CNC domains☆12Updated last year
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Updated 5 years ago
- Debian 8 hardening checklist for CyberPatriot. Should work on other distros.☆16Updated 5 years ago
- 🐒 Browser extension for wasting scammers' time and patience.☆13Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆29Updated 4 years ago