jselliott / SIV-US-Cyber-OpenLinks
Challenges and writeups for the US Cyber Open for 2024
☆19Updated 11 months ago
Alternatives and similar repositories for SIV-US-Cyber-Open
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
Sorting:
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- General purpose attack-defense range for zero-config deployment☆27Updated 3 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆50Updated 2 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆100Updated 2 months ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated last month
- 'Ike: A binary exploitation and reversing handbook.☆79Updated 4 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- UFSIT scripts and tools for hardening and auditing☆13Updated last week
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆13Updated 3 months ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆39Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆97Updated 2 years ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆80Updated this week
- redpwn's challenge deployment system☆28Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- Volatility Symbol Generator for Linux Kernels☆35Updated last year
- ☆28Updated 4 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆156Updated 6 months ago
- A comprehensive Hypervisor resources repo☆108Updated last week
- Hardened your Windows OS against forensics analysis☆21Updated 6 months ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago