jselliott / NSACodebreaker19Links
Scripts and Writeups for the NSA Codebreaker Challenge 2019
☆61Updated 4 years ago
Alternatives and similar repositories for NSACodebreaker19
Users that are interested in NSACodebreaker19 are comparing it to the libraries listed below
Sorting:
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- ☆182Updated 5 years ago
- ☆32Updated 3 weeks ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 4 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- NSA Codebreaker Challenge 2019 write-ups.☆21Updated 5 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆74Updated 5 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆138Updated 5 years ago
- ☆17Updated 5 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated last year
- Guide to buffer overflows☆59Updated 4 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆56Updated 4 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 6 months ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Fast Static File Analysis Framework☆104Updated 5 years ago
- A workshop on Packet Crafting using Scapy.☆159Updated 5 years ago
- ☆54Updated 5 years ago
- Reverse engineering challenges☆52Updated 5 years ago
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago