jselliott / NSACodebreaker19
Scripts and Writeups for the NSA Codebreaker Challenge 2019
☆61Updated 3 years ago
Alternatives and similar repositories for NSACodebreaker19:
Users that are interested in NSACodebreaker19 are comparing it to the libraries listed below
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- NSA Codebreaker Challenge 2019 write-ups.☆21Updated 5 years ago
- ☆17Updated 5 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- WIP - Revamped Alfred [2.0]☆39Updated last week
- ☆32Updated 6 months ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated last year
- ☆182Updated 5 years ago
- ☆23Updated 4 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆73Updated 5 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- ☆20Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆80Updated 7 months ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- ☆54Updated 4 years ago
- Various capabilities for static malware analysis.☆77Updated 7 months ago
- Reverse engineering challenges☆50Updated 5 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- An advanced memory forensics framework☆95Updated 5 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago