jordanpotti / ccdc
CCDC: A collaboration between schools to share CCDC knowledge
☆47Updated 8 years ago
Alternatives and similar repositories for ccdc:
Users that are interested in ccdc are comparing it to the libraries listed below
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆134Updated 3 weeks ago
- Scoring Engine for Red/White/Blue Team Competitions☆128Updated this week
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- Brian's Pentesting and Technical Tips for You☆120Updated 8 months ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆30Updated 8 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- ☆76Updated 6 years ago
- ☆53Updated 4 years ago
- 504 VSAgent☆23Updated 7 years ago
- ☆54Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆89Updated last month
- ☆200Updated 3 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 6 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- ☆82Updated 5 years ago
- This is a bash script to bypass 802.1x NAC☆95Updated 2 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- All my slides for any talks☆23Updated 6 months ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆61Updated 12 years ago
- Some PowerShell Defensive Scripts☆127Updated 8 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆54Updated 7 years ago