bjh7242 / NECCDC-2017-ConfigsLinks
Configs for NECCDC 2017
☆16Updated 8 years ago
Alternatives and similar repositories for NECCDC-2017-Configs
Users that are interested in NECCDC-2017-Configs are comparing it to the libraries listed below
Sorting:
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- ☆113Updated 8 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Extract Sense out of Gibberish stuff☆82Updated 8 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Some IR notes☆73Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- ☆108Updated 8 years ago
- The documents☆56Updated 7 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Updated 5 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 3 months ago