archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆21Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- A repo to support the book☆110Updated 4 years ago
- The best resources for learning exploit development☆119Updated 5 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆61Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- A curated list of resources for the OSED journey.☆67Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆16Updated last year
- 0xpat blog☆104Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
- ☆193Updated last year
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- king of the hill cybersecurity competition☆32Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 5 years ago
- ☆15Updated 4 years ago
- ☆51Updated 2 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- PCAP visualization tool☆104Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- ☆26Updated this week
- ☆64Updated last year
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- OSEE Preparation☆188Updated 6 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆54Updated last year
- Malware Analysis Exercise Samples and Resources☆51Updated last week
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago