cyber-defense-organization / CCDCLinks
A collection of resources helpful for red vs blue team competitions
☆9Updated 5 years ago
Alternatives and similar repositories for CCDC
Users that are interested in CCDC are comparing it to the libraries listed below
Sorting:
- autopwn + deployment☆15Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆91Updated 2 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- ☆69Updated 3 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 3 years ago
- ☆79Updated 5 years ago
- ☆18Updated 5 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Event Data Collector☆37Updated last month
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- ☆62Updated 11 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 11 months ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- ☆48Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆21Updated 6 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago