archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆21Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- A repo to support the book☆108Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- 0xpat blog☆102Updated 3 years ago
- The best resources for learning exploit development☆118Updated 5 years ago
- PCAP visualization tool☆103Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- A curated list of resources for the OSED journey.☆66Updated 3 years ago
- ☆51Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆180Updated last year
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆39Updated 8 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- ☆189Updated last year
- Malware Analysis Exercise Samples and Resources☆45Updated this week
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- Malware Analysis Techniques, published by Packt☆76Updated 2 years ago
- ☆64Updated last year
- Collection of resources for my preparation to take the OSEE certification.☆286Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 8 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated last year
- esoteric☆55Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Research notes☆128Updated 8 months ago