cyber-defense-organization / CCDCLinks
A collection of resources helpful for red vs blue team competitions
☆9Updated 5 years ago
Alternatives and similar repositories for CCDC
Users that are interested in CCDC are comparing it to the libraries listed below
Sorting:
- autopwn + deployment☆15Updated 3 years ago
- ☆69Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Updated last year
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- ☆79Updated 5 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆91Updated 2 years ago
- A repo to support the book☆108Updated 3 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 3 years ago
- ☆115Updated 3 months ago
- Repository of open source malware here on Github!☆44Updated 3 years ago
- ☆63Updated last year
- Machine Learning Network Share Password Hunting Toolkit☆127Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- ☆12Updated 3 months ago
- ☆18Updated 5 years ago
- ☆9Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Defensive Origins Training Schedule☆38Updated last year
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆93Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- ☆13Updated 5 years ago