issessions / ISSessionsCTF2022Links
☆11Updated 3 years ago
Alternatives and similar repositories for ISSessionsCTF2022
Users that are interested in ISSessionsCTF2022 are comparing it to the libraries listed below
Sorting:
- Challenges and other resources for magpieCTF 2022.☆16Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆1,029Updated 6 months ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,183Updated 2 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,001Updated 4 months ago
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,711Updated 2 weeks ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,203Updated 2 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,041Updated 2 weeks ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆704Updated last year
- A new social network for taking photos in your home town.☆66Updated last year
- List of learning resources, learning platforms, and tools useful for CTF and cybersecurity in general☆19Updated 3 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆55Updated 2 weeks ago
- A collection of write-ups and solutions for Cyber FastTrack Spring 2021.☆48Updated 4 years ago
- United States Air Force Academy public tools☆18Updated 11 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,409Updated last month
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,563Updated 7 months ago
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆743Updated 7 months ago
- ☆1,136Updated 4 years ago
- Practical Windows Forensics Training☆691Updated last year
- SOC Interview Questions☆1,201Updated last year
- A mostly-serverless distributed hash cracking platform☆620Updated last month
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆558Updated 5 years ago
- Describing and documenting the process of deploying a HomeLab for security research and training☆40Updated 5 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆767Updated 4 years ago
- Intro Labs Remastered☆34Updated 7 months ago
- https://academy.tcm-sec.com/☆143Updated 4 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,241Updated this week
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,442Updated 2 weeks ago
- Purple Team Exercise Framework☆741Updated last year
- Steganography significant bits image decoder. Can help you out with some CTF☆35Updated 3 years ago
- A list of cyber-chef recipes and curated links☆2,137Updated last year