infosec-ucalgary / magpieCTF-2021
Challenges and other resources for magpieCTF 2021.
☆19Updated 2 years ago
Alternatives and similar repositories for magpieCTF-2021:
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
- Challenges and other resources for magpieCTF 2022.☆16Updated 2 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- Cracking the Security Engineer Interviews☆52Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 3 months ago
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 3 years ago
- A cybersecurity game in Azure Data Explorer☆167Updated 7 months ago
- Creation of a laboratory for malware analysis in AWS☆93Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Easily create index of your SANS books☆15Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 6 months ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆56Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆85Updated this week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- Reverse engineering basics in puzzle form☆180Updated 4 years ago
- High signal information security sources Goggle.☆67Updated last year
- ☆71Updated 11 months ago
- Labtainers: A Docker-based cyber lab framework☆277Updated this week
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Writeup for the DEF CON 30 badge challenge☆69Updated 2 years ago
- ☆47Updated 3 weeks ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated 10 months ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆149Updated last year
- Holds the public Hacking the Cloud CTFs.☆54Updated 11 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆61Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 2 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆37Updated 3 years ago