jselliott / SIV-US-Cyber-OpenLinks
Challenges and writeups for the US Cyber Open for 2024
☆19Updated last year
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- General purpose attack-defense range for zero-config deployment☆27Updated 4 months ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆81Updated 5 months ago
- UFSIT scripts and tools for hardening and auditing☆14Updated last month
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆129Updated 11 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Learn Binary Exploitation with sample problems and solutions☆148Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆105Updated 2 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆124Updated 3 weeks ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- Runs exploits, fast.☆84Updated 11 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- ☆100Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆187Updated last week
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- A comprehensive Hypervisor resources repo☆115Updated this week
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆150Updated last month
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆85Updated 3 weeks ago
- 🧞♂️ malware analysis☆37Updated last year
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆26Updated 10 months ago
- redpwn's challenge deployment system☆28Updated last year