infosec-ucalgary / magpieCTF-2021Links
Challenges and other resources for magpieCTF 2021.
☆19Updated 3 years ago
Alternatives and similar repositories for magpieCTF-2021
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
Sorting:
- Challenges and other resources for magpieCTF 2022.☆16Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 9 months ago
- Automate writeup for vulnerable machines.☆40Updated 2 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆319Updated 4 months ago
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆149Updated last month
- ☆21Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆268Updated this week
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 5 months ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated 11 months ago
- ☆134Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Labtainers: A Docker-based cyber lab framework☆292Updated 2 months ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- Shared Blogs and Notebooks☆480Updated last year
- A cybersecurity game in Azure Data Explorer☆172Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap …☆27Updated 5 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 10 months ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆259Updated last year
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- A curated constantly-growing library of infographics for network students☆99Updated 4 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 5 months ago
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago