archang31 / aacs4-writeups
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆18Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for aacs4-writeups
- A repo to support the book☆103Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago
- Understanding and analyzing carrier files workshop repo☆47Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 2 months ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆9Updated 3 years ago
- ☆25Updated 4 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆23Updated last year
- A curated list of resources for the OSED journey.☆56Updated 2 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 4 years ago
- ☆76Updated 4 years ago
- ☆59Updated 4 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 4 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆32Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- Posts about different topics☆36Updated 7 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆61Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆38Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆28Updated 6 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆34Updated 2 months ago
- Run several volatility plugins at the same time☆108Updated 2 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 2 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- Scripts I used during CTP☆66Updated 4 years ago