cisagov / prescup-challengesView external linksLinks
President's Cup Cybersecurity Competition Challenges
☆195Feb 5, 2026Updated last week
Alternatives and similar repositories for prescup-challenges
Users that are interested in prescup-challenges are comparing it to the libraries listed below
Sorting:
- A simple virtual lab builder/player☆35Jan 26, 2026Updated 2 weeks ago
- ☆31Mar 28, 2025Updated 10 months ago
- hackasat-qualifier-2023☆28May 16, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Feb 6, 2026Updated last week
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Generate HTTPS reports based on scan data☆15Updated this week
- ☆11Oct 6, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- Utility for performing bulk download operations in https://github.com/CVEProject/cvelistV5☆23Mar 20, 2025Updated 10 months ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- A collection of PowerShell and SQL scripts to automate the STIG process of a Microsoft SQL 2014 Server.☆15Sep 30, 2016Updated 9 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆14Aug 9, 2023Updated 2 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- ☆20Dec 19, 2017Updated 8 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Gather domains as a precursor to scanning☆20Updated this week
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated this week
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆662Updated this week
- A curated list of tools for incident response☆20Sep 24, 2019Updated 6 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆22May 12, 2020Updated 5 years ago
- Downgrade HTTP authentication on the network to capture clear-text credentials from clients☆19Nov 7, 2023Updated 2 years ago
- A host-based IDS and network monitoring system (My graduation project)☆25Jul 6, 2021Updated 4 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Bad scripts I made doing CTF's☆21Jan 18, 2024Updated 2 years ago
- ☆25Dec 8, 2021Updated 4 years ago
- A command based package for simple display of statistics☆25Dec 2, 2024Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- A set of guidelines and best practices for an awesome engineering team☆265Dec 15, 2025Updated 2 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 4 years ago