infosec-ucalgary / magpieCTF-2021Links
Challenges and other resources for magpieCTF 2021.
☆19Updated 3 years ago
Alternatives and similar repositories for magpieCTF-2021
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
Sorting:
- Challenges and other resources for magpieCTF 2022.☆16Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Labtainers: A Docker-based cyber lab framework☆292Updated last month
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 8 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆267Updated this week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆149Updated 3 weeks ago
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆245Updated this week
- Automate writeup for vulnerable machines.☆40Updated 2 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆320Updated 4 months ago
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- Cracking the Security Engineer Interviews☆55Updated 2 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- A template for writing a condensed course index leveraging LaTeX indexing☆108Updated last month
- Hacking training websites list and tutorials☆29Updated 3 months ago
- Shared Blogs and Notebooks☆478Updated last year
- A curated constantly-growing library of infographics for network students☆99Updated 4 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- A curated reading list about offensive IT security☆143Updated 2 weeks ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 4 months ago
- ☆32Updated 9 months ago
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- A very opinionated list of security tools☆128Updated 4 months ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- President's Cup Cybersecurity Competition Challenges☆174Updated 3 weeks ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- ☆77Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆144Updated 4 months ago