jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- UFSIT scripts and tools for hardening and auditing☆14Updated last month
- General purpose attack-defense range for zero-config deployment☆27Updated 4 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Deny list generator for password filters☆26Updated 10 months ago
- ☆68Updated 6 months ago
- Creation of a laboratory for malware analysis in AWS☆100Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆35Updated this week
- All kinds of tiny shells☆58Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- A script to download all the challenges and files from the CTFd instance.☆56Updated last week
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- Jupyter Notebooks for the Blue Team☆36Updated 5 months ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆38Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- ☆71Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆40Updated this week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated last week
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year