archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆22Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- A repo to support the book☆113Updated 4 years ago
- A curated list of resources for the OSED journey.☆72Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- ☆53Updated 2 years ago
- The best resources for learning exploit development☆124Updated 6 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Updated 3 years ago
- ☆199Updated last year
- ☆64Updated last year
- PCAP visualization tool☆104Updated 2 years ago
- esoteric☆56Updated 5 years ago
- 0xpat blog☆109Updated 4 years ago
- Windbg Readable & Dark Green Theme - Own Use☆46Updated 6 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Updated 4 months ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- Research notes☆131Updated last year
- OSEE Preparation☆192Updated 6 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Updated 5 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- ☆15Updated 4 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Updated 4 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- ☆318Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆80Updated 2 years ago
- RE / Binary Exploitation Resources☆74Updated 8 years ago