jselliott / SIV-US-Cyber-OpenLinks
Challenges and writeups for the US Cyber Open for 2024
☆20Updated last year
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- A script to download all the challenges and files from the CTFd instance.☆60Updated 5 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 4 months ago
- General purpose attack-defense range for zero-config deployment☆38Updated this week
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Workshop on firmware reverse engineering☆346Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆167Updated last year
- Write ups for Ph0wn CTF☆47Updated 3 months ago
- Resources for learning malware analysis and reverse engineering☆139Updated last year
- ☆130Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 3 months ago
- Research notes☆130Updated 11 months ago
- ☆113Updated last year
- Binary Exploitation Phrack CTF Challenge☆138Updated 3 months ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆21Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆130Updated 5 months ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆148Updated 2 months ago
- Collection of steganography tools for images and text☆42Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 3 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- A list of useful tools for Malware Analysis (will be updated regularly)☆150Updated 3 months ago
- king of the hill cybersecurity competition☆32Updated 3 years ago
- ios tingz☆63Updated 3 years ago
- Learn Binary Exploitation with sample problems and solutions☆167Updated 2 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆93Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago