jselliott / SIV-US-Cyber-Open
Challenges and writeups for the US Cyber Open for 2024
☆19Updated 11 months ago
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- UFSIT scripts and tools for hardening and auditing☆13Updated 3 weeks ago
- General purpose attack-defense range for zero-config deployment☆27Updated 2 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- A script to download all the challenges and files from the CTFd instance.☆55Updated 3 weeks ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- 'Ike: A binary exploitation and reversing handbook.☆76Updated 3 months ago
- king of the hill cybersecurity competition☆27Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆13Updated 3 months ago
- Lena's repo of Malware Monsters aka Malmons.☆32Updated 2 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆100Updated last month
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆54Updated 6 months ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆36Updated 9 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆20Updated 2 years ago
- redpwn's challenge deployment system☆28Updated last year
- ☆37Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆24Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆154Updated 6 months ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 4 months ago
- Proof-of-concept modular implant platform leveraging v8☆52Updated 2 months ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated last month
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year