jselliott / CyberFastTrack_SP2020
A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF
☆60Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CyberFastTrack_SP2020
- Example reports from prior years of the Collegiate Penetration Testing Competition☆134Updated 5 months ago
- links collected from SOC Core Skills class☆84Updated 3 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆109Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆64Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆59Updated 3 years ago
- Resource for developing infosec skills for OSCP☆115Updated 4 months ago
- Python template to assist with buffer overflows☆70Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- A collection of write-ups and solutions for Cyber FastTrack Spring 2021.☆48Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆128Updated 6 months ago
- ☆76Updated 3 years ago
- A Python API for Hack the Box platform interaction☆63Updated 3 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆47Updated 4 years ago
- My OSCP notes☆215Updated 3 months ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- This contains the public CCDC materials for Cyber@UCR.☆34Updated 11 months ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆177Updated 5 years ago
- Automate writeup for vulnerable machines.☆41Updated last year
- Resources for Building Virtual Machine Labs Live Training. YEET.☆123Updated 5 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆98Updated 4 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 3 years ago
- OSCP cheatsheet☆108Updated 9 months ago
- An ongoing list of virtual cybersecurity conferences.☆116Updated 3 years ago
- Post exploitation helper☆37Updated last year
- Custom checklists, cheatsheets, links, and scripts☆126Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆141Updated last year
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated last year