curtisf / cyberpatriot-debian8-hardeningLinks
Debian 8 hardening checklist for CyberPatriot. Should work on other distros.
☆17Updated 5 years ago
Alternatives and similar repositories for cyberpatriot-debian8-hardening
Users that are interested in cyberpatriot-debian8-hardening are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- Cyber Patriot scripts for the IX competition.☆80Updated 6 years ago
- Different cyberpatriot checklists and scripts I wrote☆50Updated 7 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆25Updated 8 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 3 months ago
- Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.☆10Updated last year
- President's Cup Cybersecurity Competition Challenges☆175Updated 2 weeks ago
- A GUI and CLI tool for removing bloat from executables☆411Updated last month
- a curated, categorised collection of useful projects 👨👩👧☆118Updated last month
- Windows Forensics Environment Builder☆156Updated last month
- Ransomware leak site monitoring☆314Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 5 months ago
- Tools for simulating threats☆192Updated last year
- The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportu…☆212Updated 6 months ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- A cybersecurity game in Azure Data Explorer☆172Updated last year
- 🔐 Vulnerability remediation scoring system☆121Updated last year
- A basic flask based Outlook Web Honey pot☆67Updated 2 years ago
- Tools to automatically create a SANS index based off the course pdf files.☆107Updated 5 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆406Updated last year
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- My attempt at weaponizing Discord.☆18Updated 3 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆354Updated last year
- ☆34Updated 2 years ago
- CTFs as you need them☆29Updated 2 years ago
- ☆87Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- Windows Malware Investigation Scripts & Docs☆83Updated 9 months ago