archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆20Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- The best resources for learning exploit development☆116Updated 5 years ago
- A repo to support the book☆108Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- A curated list of resources for the OSED journey.☆64Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- ☆188Updated last year
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- PCAP visualization tool☆103Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆28Updated 11 months ago
- Malware Analysis Exercise Samples and Resources☆45Updated this week
- ☆63Updated last year
- ☆26Updated 5 months ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- ☆84Updated 7 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- 0xpat blog☆101Updated 3 years ago
- Code snips and notes☆137Updated 3 years ago
- esoteric☆55Updated 4 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆71Updated last year
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- ☆51Updated 2 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆113Updated 6 years ago
- ☆15Updated 4 years ago
- ☆310Updated 3 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆49Updated 4 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago