archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆19Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated last year
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- A repo to support the book☆108Updated 3 years ago
- ☆62Updated 11 months ago
- A curated list of resources for the OSED journey.☆63Updated 3 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Malware Analysis Exercise Samples and Resources☆41Updated last week
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 9 months ago
- esoteric☆54Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- Windbg Readable & Dark Green Theme - Own Use☆45Updated 6 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- ☆184Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- ☆79Updated 5 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- ☆15Updated 3 years ago
- Python API for interacting with sigma rules.☆55Updated 2 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago