cobbr / Judge
Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.
☆20Updated 7 years ago
Alternatives and similar repositories for Judge:
Users that are interested in Judge are comparing it to the libraries listed below
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- ☆30Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- ☆12Updated 3 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- Hostile Dropboxes Management☆25Updated 5 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Scoring Engine for CTF competitions☆46Updated last year
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago