infosec-ucalgary / magpieCTF-2021Links
Challenges and other resources for magpieCTF 2021.
☆19Updated 2 years ago
Alternatives and similar repositories for magpieCTF-2021
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
Sorting:
- Security Information and Event Management in Minecraft☆119Updated 3 years ago
- Challenges and other resources for magpieCTF 2022.☆16Updated 3 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 2 months ago
- Different learning materials☆227Updated 3 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 7 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆154Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 3 years ago
- A cybersecurity game in Azure Data Explorer☆172Updated 11 months ago
- A targeted DNS cache poisoner☆120Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated last week
- IoT Digital Forensics Course with hands-on labs☆228Updated last year
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Labtainers: A Docker-based cyber lab framework☆291Updated this week
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago
- Deny list generator for password filters☆26Updated 10 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆168Updated 4 months ago
- ☆231Updated 2 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- ☆71Updated 4 months ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- ☆121Updated last year
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- The latest pyWars client for the SEC573 class☆44Updated 3 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year