Scripts I have made for blue team
☆16Apr 1, 2018Updated 7 years ago
Alternatives and similar repositories for Cyber-Defense-Competition-Scripts
Users that are interested in Cyber-Defense-Competition-Scripts are comparing it to the libraries listed below
Sorting:
- ☆20Feb 3, 2026Updated 3 weeks ago
- Project Eyes On is a high-speed, multi-threaded surveillance tool by Y0oshi (@rde0) for locating open IP cameras worldwide. Unifies Googl…☆73Jan 12, 2026Updated last month
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆27Jan 18, 2020Updated 6 years ago
- The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacki…☆93Jan 16, 2026Updated last month
- ☆42Dec 22, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Process Nanny. It's like daemontools or supervisord, but fun.☆14Jun 30, 2011Updated 14 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- ☆13Sep 24, 2023Updated 2 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- ☆10Aug 1, 2024Updated last year
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated 2 months ago
- ☆13Aug 1, 2023Updated 2 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Feb 18, 2026Updated last week
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago