Challenges that I made for the DoD Cyber Sentinel Challenge of 2024
☆22May 19, 2024Updated last year
Alternatives and similar repositories for DoD-Cyber-Sentinel-2024
Users that are interested in DoD-Cyber-Sentinel-2024 are comparing it to the libraries listed below
Sorting:
- Challenges for the DoD Cyber Challenge C1 CTF☆16May 3, 2024Updated last year
- A script to download all the challenges and files from the CTFd instance.☆62Jun 14, 2025Updated 9 months ago
- ☆17Jan 20, 2026Updated 2 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Challenges and writeups for the US Cyber Open for 2024☆21Jun 11, 2024Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- ☆16May 10, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- ☆29Jun 18, 2025Updated 9 months ago
- Windows Privilege Escalation Tool☆19Dec 30, 2025Updated 2 months ago
- Cyber Security resource list☆18Jan 21, 2025Updated last year
- A lightweight Windows Prefetch file parser to extract programs' execution history☆68Jan 12, 2026Updated 2 months ago
- TLS & SNI aware netcat☆49Oct 23, 2024Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 2 months ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆118Oct 19, 2025Updated 5 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Tools and Resources for Physical Security Red Teaming☆46Mar 11, 2026Updated last week
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 5 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 5 months ago
- DShield Sensor Log Collection with ELK☆46Mar 9, 2026Updated last week
- ☆30Nov 25, 2025Updated 3 months ago
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Nov 22, 2021Updated 4 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- ☆46Dec 23, 2024Updated last year
- ☆12Nov 12, 2023Updated 2 years ago
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 6 months ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆70Sep 6, 2021Updated 4 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago