infosec-ucalgary / magpieCTF-2021Links
Challenges and other resources for magpieCTF 2021.
☆19Updated 3 years ago
Alternatives and similar repositories for magpieCTF-2021
Users that are interested in magpieCTF-2021 are comparing it to the libraries listed below
Sorting:
- Challenges and other resources for magpieCTF 2022.☆16Updated 3 years ago
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- Labtainers: A Docker-based cyber lab framework☆302Updated 2 weeks ago
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- Implementing the CIS Critical Controls (almost) for Free☆87Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- A curated constantly-growing library of infographics for network students☆99Updated 4 years ago
- Shared Blogs and Notebooks☆488Updated 2 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆13Updated this week
- A cybersecurity game in Azure Data Explorer☆174Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago
- NSA Codebreaker Challenge 2021 Write-Ups☆59Updated 3 years ago
- ☆21Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆119Updated 3 weeks ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated 2 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆323Updated 8 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated 2 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 8 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- This repository is for the vagrant instances of VulnHub machines☆46Updated last year
- President's Cup Cybersecurity Competition Challenges☆192Updated 3 months ago
- Azure as an external process source for psDoom-ng☆87Updated 3 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆118Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Updated last week