Scripts and resources for Red Teaming at CCDC competitions
☆105Sep 9, 2022Updated 3 years ago
Alternatives and similar repositories for CCDC-Scripts
Users that are interested in CCDC-Scripts are comparing it to the libraries listed below
Sorting:
- ☆84Oct 8, 2023Updated 2 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆49Feb 15, 2017Updated 9 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Jan 8, 2017Updated 9 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆886Sep 9, 2022Updated 3 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 7 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆57Dec 3, 2016Updated 9 years ago
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Lewis & Clark CCDC Team Resources☆17Mar 27, 2015Updated 10 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- A ton of helpful tools☆345Oct 8, 2021Updated 4 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- initial commit☆174Jun 11, 2018Updated 7 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Malleable C2 profiles for Cobalt Strike☆75Sep 9, 2022Updated 3 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- A collection of useful scripts for Cobalt Strike☆172Aug 15, 2024Updated last year
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Aggressor scripts I've made for Cobalt Strike☆412Jul 29, 2023Updated 2 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Nov 23, 2017Updated 8 years ago