Challenges that I made for the DoD Cyber Sentinel Challenge of 2024
☆23May 19, 2024Updated 2 years ago
Alternatives and similar repositories for DoD-Cyber-Sentinel-2024
Users that are interested in DoD-Cyber-Sentinel-2024 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenges for the DoD Cyber Challenge C1 CTF☆16May 3, 2024Updated 2 years ago
- A script to download all the challenges and files from the CTFd instance.☆65Jun 14, 2025Updated 11 months ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆20May 14, 2026Updated last week
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Jun 13, 2023Updated 2 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆18Jun 3, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆21Jun 11, 2024Updated last year
- https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques☆18Jan 29, 2022Updated 4 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆16Jul 17, 2025Updated 10 months ago
- Who We Are☆22Sep 6, 2024Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆16May 10, 2023Updated 3 years ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆48Mar 12, 2026Updated 2 months ago
- ☆29Jun 18, 2025Updated 11 months ago
- ☆27Oct 15, 2025Updated 7 months ago
- Bypass CloudFlare to find real IP address☆20Nov 27, 2018Updated 7 years ago
- BOF template with boflink and mutator kit support☆51Jan 8, 2026Updated 4 months ago
- TLS & SNI aware netcat☆51Oct 23, 2024Updated last year
- A lightweight Windows Prefetch file parser to extract programs' execution history☆69Jan 12, 2026Updated 4 months ago
- This repository enables learners to perform front-end full stack development, with emphasis on employability skills. The repository cover…☆14Feb 20, 2024Updated 2 years ago
- Subdomain Bruteforce - Bounty Quick Code☆32Sep 6, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Convert your shellcode into an ASCII string☆129Jun 27, 2025Updated 10 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆75Dec 26, 2025Updated 4 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆46Sep 6, 2024Updated last year
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆124Oct 19, 2025Updated 7 months ago
- Writeups for CTF challenges.☆79Oct 10, 2023Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆49Aug 30, 2023Updated 2 years ago
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 8 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆30Nov 25, 2025Updated 5 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆19Aug 9, 2024Updated last year
- Non-official write up for the Juice-Shop CTF☆71May 15, 2025Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Nov 22, 2021Updated 4 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- ☆46Dec 23, 2024Updated last year