cisagov / prescup-challenges
President's Cup Cybersecurity Competition Challenges
☆168Updated 2 weeks ago
Alternatives and similar repositories for prescup-challenges
Users that are interested in prescup-challenges are comparing it to the libraries listed below
Sorting:
- Tools for simulating threats☆183Updated last year
- Indexes for SANS Courses and GIAC Certifications☆247Updated 11 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆248Updated last week
- ☆59Updated 4 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆245Updated last month
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆60Updated 3 months ago
- Splunk Boss of the SOC version 3 dataset.☆337Updated 4 years ago
- ☆76Updated 3 years ago
- This repo is meant to be a list of companies that hire security people full remote.☆94Updated 7 months ago
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportu…☆207Updated 3 months ago
- The latest pyWars client for the SEC573 class☆44Updated 2 months ago
- ☆46Updated last year
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- ☆48Updated 2 weeks ago
- Jupyter Notebooks for the Blue Team☆144Updated last month
- Cast is an installer for any compatible Saltstack based distribution like SIFT or REMnux☆115Updated this week
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆227Updated 4 months ago
- Tools to automatically create a SANS index based off the course pdf files.☆100Updated 4 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆25Updated this week
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated last week
- links collected from SOC Core Skills class☆85Updated 4 years ago
- ☆68Updated 4 months ago
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 4 years ago
- Harness the power of Splunk for your investigations☆105Updated last month
- Collection of Jupyter Notebooks by @fr0gger_☆161Updated this week
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆123Updated last week
- A cybersecurity game in Azure Data Explorer☆170Updated 10 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆249Updated 2 years ago