jselliott / SIV-US-Cyber-Open
Challenges and writeups for the US Cyber Open for 2024
☆17Updated 3 months ago
Related projects: ⓘ
- Challenges created for the US Cyber Open 2023 (Season 3)☆10Updated last year
- General purpose attack-defense range for zero-config deployment☆14Updated 2 weeks ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆40Updated 5 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆37Updated last year
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- ELFEN: Automated Linux Malware Analysis Sandbox☆115Updated 2 months ago
- A script to download all the challenges and files from the CTFd instance.☆41Updated 2 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆138Updated this week
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆46Updated 2 weeks ago
- Creation of a laboratory for malware analysis in AWS☆84Updated last year
- All kinds of tiny shells☆59Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆73Updated last month
- Code snippets for Reverse engineering training for xtraining platform☆33Updated last year
- The most comprehensive resource for Virtualization with a focus on Cybersecurity, Learn, exploit, read, and create let's make the industr…☆87Updated last month
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆75Updated 5 months ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated last month
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- A collection of tools that I use in CTF's or for assessments☆50Updated last month
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆36Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆125Updated 8 months ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆29Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆43Updated 9 months ago
- Repository of Yara Rules☆83Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆131Updated last year
- ☆106Updated this week