jselliott / SIV-US-Cyber-Open
Challenges and writeups for the US Cyber Open for 2024
☆18Updated 10 months ago
Alternatives and similar repositories for SIV-US-Cyber-Open:
Users that are interested in SIV-US-Cyber-Open are comparing it to the libraries listed below
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- General purpose attack-defense range for zero-config deployment☆27Updated 2 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 11 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- UFSIT scripts and tools for hardening and auditing☆13Updated this week
- A script to download all the challenges and files from the CTFd instance.☆55Updated 9 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆43Updated last year
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Dump quarantined files from Windows Defender☆62Updated 3 years ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated 2 weeks ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆12Updated 2 months ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆19Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- king of the hill cybersecurity competition☆27Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 4 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆100Updated last month
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- Repository to index useful tools for CTF's☆26Updated this week
- Volatility Symbol Generator for Linux Kernels☆34Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- A tool to use novel locations to extract metadata from Office documents.☆62Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆75Updated 3 months ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- All kinds of tiny shells☆58Updated 2 years ago