CCDC: A collaboration between schools to share CCDC knowledge
☆49Feb 15, 2017Updated 9 years ago
Alternatives and similar repositories for ccdc
Users that are interested in ccdc are comparing it to the libraries listed below
Sorting:
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆139Mar 30, 2025Updated 11 months ago
- Scripts and resources for Red Teaming at CCDC competitions☆105Sep 9, 2022Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Jan 8, 2017Updated 9 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆135Feb 27, 2026Updated last week
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Contains resources from our weekly meetings including slides, cheat sheets, and other things we may show or give out.☆22Feb 17, 2025Updated last year
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Practical examples and simulations developed at GNURadio☆17Feb 15, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Repo for reverse engineering the Hantek 6254BD USB-connected oscilloscope☆14Jul 21, 2019Updated 6 years ago
- V1.0☆15Aug 8, 2016Updated 9 years ago
- Configs for NECCDC 2017☆16Mar 22, 2017Updated 8 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Jul 3, 2019Updated 6 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago