jselliott / SIV-US-Cyber-OpenLinks
Challenges and writeups for the US Cyber Open for 2024
☆20Updated last year
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- General purpose attack-defense range for zero-config deployment☆40Updated last month
- A script to download all the challenges and files from the CTFd instance.☆61Updated 6 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Write ups for Ph0wn CTF☆47Updated 5 months ago
- 'Ike: A binary exploitation and reversing handbook.☆89Updated 4 months ago
- Workshop on firmware reverse engineering☆353Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Runs exploits, fast.☆107Updated 3 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 5 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆133Updated 4 months ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆150Updated 4 months ago
- 🐍 Solving CTF challenges using Z3 and Python☆62Updated 2 years ago
- Code snippets for Reverse engineering training for xtraining platform☆33Updated 3 years ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 3 months ago
- ☆122Updated last year
- Research notes☆131Updated last year
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Updated 3 years ago
- ☆130Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 2 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Learn Binary Exploitation with sample problems and solutions☆169Updated 3 years ago
- Docker container for quickly analyzing Linux malware☆83Updated 2 years ago