President's Cup Cybersecurity Competition Challenges
☆197Feb 5, 2026Updated last month
Alternatives and similar repositories for prescup-challenges
Users that are interested in prescup-challenges are comparing it to the libraries listed below
Sorting:
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Mar 2, 2026Updated last week
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Utility for performing bulk download operations in https://github.com/CVEProject/cvelistV5☆23Mar 20, 2025Updated 11 months ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- A collection of PowerShell and SQL scripts to automate the STIG process of a Microsoft SQL 2014 Server.☆15Sep 30, 2016Updated 9 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated 2 weeks ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Nov 11, 2019Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- ☆20Dec 19, 2017Updated 8 years ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Mar 2, 2026Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Downgrade HTTP authentication on the network to capture clear-text credentials from clients☆19Nov 7, 2023Updated 2 years ago
- AbuseIpDB - Wrapper around the AbuseIPDb service API☆16May 15, 2024Updated last year
- A host-based IDS and network monitoring system (My graduation project)☆26Jul 6, 2021Updated 4 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- ☆20Jul 25, 2024Updated last year
- Bad scripts I made doing CTF's☆21Jan 18, 2024Updated 2 years ago
- ☆25Dec 8, 2021Updated 4 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 5 years ago
- A command based package for simple display of statistics☆25Dec 2, 2024Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Jul 10, 2018Updated 7 years ago
- A set of guidelines and best practices for an awesome engineering team☆269Feb 25, 2026Updated last week
- ☆10Sep 11, 2021Updated 4 years ago
- ☆57Aug 19, 2024Updated last year