jselliott / SIV-US-Cyber-OpenLinks
Challenges and writeups for the US Cyber Open for 2024
☆19Updated last year
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- General purpose attack-defense range for zero-config deployment☆30Updated 5 months ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated last month
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated last week
- 'Ike: A binary exploitation and reversing handbook.☆82Updated 6 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆101Updated last year
- Learn Binary Exploitation with sample problems and solutions☆151Updated 2 years ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆21Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆161Updated 8 months ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆152Updated last month
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆108Updated last month
- Runs exploits, fast.☆87Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆125Updated last month
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆77Updated last week
- ☆123Updated last year
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- redpwn's challenge deployment system☆28Updated last year
- examples of using radius2 to solve reversing challenges☆35Updated 7 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last year
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago