cyber-defense-organization / CCDC
A collection of resources helpful for red vs blue team competitions
☆9Updated 5 years ago
Alternatives and similar repositories for CCDC:
Users that are interested in CCDC are comparing it to the libraries listed below
- autopwn + deployment☆15Updated 2 years ago
- ELK stack for red team logs☆12Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 2 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆35Updated 5 years ago
- ☆106Updated 6 months ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆89Updated 2 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆65Updated 4 years ago
- A security competition scoring system built on the Elastic stack.☆41Updated last year
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆48Updated 4 years ago
- ☆69Updated 3 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- NGINX module to allow for RCE through a specific header☆27Updated 2 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 6 years ago
- This repo is dedicated to a powerpoint exploit☆35Updated 4 years ago
- ☆77Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- An azure devops tool for moar automation :D☆19Updated 2 years ago
- A repo to support the book☆107Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Terraform config to spin up a domain controller and some member servers in azure☆31Updated 2 years ago