The "Virtual Whale" OSINT CTF at BSides DFW 2019!
☆22Nov 2, 2019Updated 6 years ago
Alternatives and similar repositories for virtualwhale-osint-ctf
Users that are interested in virtualwhale-osint-ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Myriad plugin for generating statically typed lossless wrappers around JToken given a schema.☆15Jul 1, 2020Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Jan 20, 2018Updated 8 years ago
- Website for the Mininet Project.☆12Apr 1, 2022Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆21Jul 29, 2019Updated 6 years ago
- CYBAR OSINT CTF 2020☆23Jun 10, 2020Updated 5 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- AutoPoC Generator HoneyPoC☆36Dec 7, 2025Updated 3 months ago
- ☆34Jan 6, 2026Updated 2 months ago
- Kafka based openbmp client/consumer that manages BGP RIB tables☆11Oct 1, 2017Updated 8 years ago
- playing around with food and drink sites and OSINT☆14Oct 15, 2018Updated 7 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23May 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Measuring Internet AS dependency☆12May 10, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- CNI plugin for BaGPipe BGP☆18May 26, 2016Updated 9 years ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆17Dec 31, 2025Updated 2 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Sep 23, 2021Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- STIX Tools & Scripts☆47Dec 2, 2013Updated 12 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago