jselliott / SIV-US-Cyber-Open
Challenges and writeups for the US Cyber Open for 2024
☆18Updated 8 months ago
Alternatives and similar repositories for SIV-US-Cyber-Open:
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- UFSIT scripts and tools for hardening and auditing☆13Updated this week
- General purpose attack-defense range for zero-config deployment☆20Updated 4 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated 10 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- A script to download all the challenges and files from the CTFd instance.☆55Updated 7 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆28Updated 2 years ago
- A public, open source physical security methodology☆44Updated 10 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- king of the hill cybersecurity competition☆27Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆40Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆31Updated 11 months ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Updated 3 years ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆73Updated last month
- Deny list generator for password filters☆25Updated 6 months ago
- Hardened your Windows OS against forensics analysis☆19Updated 2 months ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆29Updated this week
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 9 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆101Updated 4 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆89Updated 2 weeks ago
- A curated list of awesome malware analysis tools and resources☆62Updated 3 years ago
- RE / Binary Exploitation Resources☆69Updated 7 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago