jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆11Updated last year
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆19Updated 11 months ago
- General purpose attack-defense range for zero-config deployment☆27Updated 3 months ago
- UFSIT scripts and tools for hardening and auditing☆13Updated last week
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated last month
- Creation of a laboratory for malware analysis in AWS☆97Updated 2 years ago
- Deny list generator for password filters☆25Updated 10 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- Lena's repo of Malware Monsters aka Malmons.☆37Updated last week
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆68Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆50Updated 2 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆30Updated 2 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 4 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 8 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 5 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago