infosec-ucalgary / magpieCTF-2021Links
Challenges and other resources for magpieCTF 2021.
☆19Updated 2 years ago
Alternatives and similar repositories for magpieCTF-2021
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
Sorting:
- Labtainers: A Docker-based cyber lab framework☆291Updated 3 weeks ago
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- Different learning materials☆227Updated 4 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆147Updated this week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆265Updated last week
- Shared Blogs and Notebooks☆477Updated last year
- Learn Binary Exploitation with sample problems and solutions☆148Updated 2 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆256Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆318Updated 3 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 8 months ago
- Security Information and Event Management in Minecraft☆119Updated 3 years ago
- An Open Letter to the OWASP Board☆107Updated last year
- A curated constantly-growing library of infographics for network students☆100Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆139Updated last year
- A living document for penetration testing and offensive security.☆304Updated last year
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆240Updated this week
- President's Cup Cybersecurity Competition Challenges☆172Updated 3 weeks ago
- Challenges and other resources for magpieCTF 2022.☆16Updated 3 years ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,024Updated 3 weeks ago
- A cybersecurity game in Azure Data Explorer☆172Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- A very opinionated list of security tools☆127Updated 3 months ago
- ☆77Updated 4 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆587Updated last week
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆509Updated last year