blueteamvillage / Project-Obsidian-DC31View external linksLinks
☆24May 22, 2024Updated last year
Alternatives and similar repositories for Project-Obsidian-DC31
Users that are interested in Project-Obsidian-DC31 are comparing it to the libraries listed below
Sorting:
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- 這份筆記是關於 Angelboy 2022 年在臺灣好厲駭開的 Windows Binary Exploitation 課程,內含個人撰寫的解題腳本、課堂筆記、以及自行設計的課堂練習題和架設腳本☆87Nov 20, 2024Updated last year
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 2, 2026Updated 2 weeks ago
- HITCON 2021 x DEVCORE Wargame☆41Jan 6, 2022Updated 4 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 9 months ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- ☆13Jul 24, 2023Updated 2 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- ☆13Dec 28, 2019Updated 6 years ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- ☆15Apr 10, 2025Updated 10 months ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- Intel® Generic Implementation of LAGraph* for Go*☆10Feb 12, 2025Updated last year
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Speak raspberry pi`s ip address.☆10Oct 6, 2016Updated 9 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- This guide helps you create an automated Earth Observation pipeline on AWS using S3 data delivery.☆10Feb 19, 2025Updated 11 months ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 6 months ago
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Cybersecurity Data Mining Competition 2016☆11Jan 19, 2019Updated 7 years ago
- A simple Bash Script to Bypass Spotify Ads.☆10Jul 7, 2021Updated 4 years ago
- Docker image to download and update most recent FireHOL IP list☆12Feb 12, 2019Updated 7 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Login and Signup form using PHP & MySQL. The code doesn't contain the elements to encrypt the password. You can enable it by using php bu…☆10Jan 27, 2019Updated 7 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated last month
- API Penetration Testing Notes☆16Sep 25, 2025Updated 4 months ago
- ☆13Mar 14, 2015Updated 10 years ago
- A reverse proxy which validates access using JWT.☆12Mar 22, 2023Updated 2 years ago
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆19May 12, 2024Updated last year
- my beautiful page <3☆21Jan 20, 2026Updated 3 weeks ago