archang31 / aacs4-writeupsLinks
All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs
☆19Updated 5 years ago
Alternatives and similar repositories for aacs4-writeups
Users that are interested in aacs4-writeups are comparing it to the libraries listed below
Sorting:
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆44Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- MAEC Schemas and Schema Development☆87Updated 5 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- A repo to support the book☆108Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- Malware Analysis Exercise Samples and Resources☆42Updated last week
- ☆62Updated 11 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- esoteric☆54Updated 4 years ago
- A curated list of resources for the OSED journey.☆64Updated 3 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- ☆26Updated 4 months ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆63Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated last year
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆116Updated 2 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- HoneyPot Orchestration☆11Updated last year
- ☆15Updated 3 years ago
- king of the hill cybersecurity competition☆30Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago