infosec-ucalgary / magpieCTF2022-public
Challenges and other resources for magpieCTF 2022.
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for magpieCTF2022-public
- Challenges and other resources for magpieCTF 2021.☆19Updated 2 years ago
- ☆11Updated 2 years ago
- A collection of write-ups and solutions for Cyber FastTrack Spring 2021.☆48Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆135Updated 6 months ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆79Updated 11 months ago
- An Obsidian vault to Github Pages workflow to hopefully make me take notes☆44Updated 2 years ago
- Announces arrivals and departures in voice chat via TTS.☆9Updated 7 months ago
- Learn Binary Exploitation with sample problems and solutions☆128Updated last year
- Automate writeup for vulnerable machines.☆41Updated last year
- JerseyCTF 2021☆24Updated 2 years ago
- Code and Website For PatchThis.app☆28Updated this week
- Public Archive for CSAW 2024 Quals☆11Updated 2 months ago
- Security Information and Event Management in Minecraft☆117Updated 2 years ago
- ☆170Updated last year
- Cybersecurity Notes☆152Updated 7 months ago
- A script to download all the challenges and files from the CTFd instance.☆48Updated 4 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- 🔐 Vulnerability remediation scoring system☆115Updated last year
- United States Air Force Academy public tools☆18Updated last week
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆56Updated last year
- https://github.com/sagishahar/lpeworkshop☆10Updated 4 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆150Updated 3 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆137Updated 2 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆120Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆207Updated last year
- a subdomain enumeration tool with lots of pep☆21Updated 6 months ago