Scripts and resources for Red Teaming at CCDC competitions
☆106Sep 9, 2022Updated 3 years ago
Alternatives and similar repositories for CCDC-Scripts
Users that are interested in CCDC-Scripts are comparing it to the libraries listed below
Sorting:
- ☆84Oct 8, 2023Updated 2 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆49Feb 15, 2017Updated 9 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Jan 8, 2017Updated 9 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆885Sep 9, 2022Updated 3 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- initial commit☆174Jun 11, 2018Updated 7 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Dec 3, 2016Updated 9 years ago
- Malleable C2 profiles for Cobalt Strike☆75Sep 9, 2022Updated 3 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆325Apr 26, 2020Updated 5 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago