archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆22Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- A repo to support the book☆112Updated 4 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆64Updated last year
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- The best resources for learning exploit development☆122Updated 6 years ago
- esoteric☆56Updated 5 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- ☆197Updated last year
- ☆80Updated 8 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- ☆64Updated last year
- 0xpat blog☆109Updated 4 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- PCAP visualization tool☆104Updated 2 years ago
- ☆54Updated 2 years ago
- OSEE Preparation☆192Updated 6 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆79Updated 2 years ago
- Knowledge Base of Exploitation Techniques☆60Updated 8 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Updated 3 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 5 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- Code snips and notes☆140Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- ☆56Updated last year