jselliott / USCyberOpen2023
Challenges created for the US Cyber Open 2023 (Season 3)
☆10Updated last year
Related projects: ⓘ
- Challenges and writeups for the US Cyber Open for 2024☆17Updated 3 months ago
- General purpose attack-defense range for zero-config deployment☆14Updated 2 weeks ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆37Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆40Updated 5 months ago
- ☆46Updated 2 weeks ago
- Deny list generator for password filters☆25Updated last month
- All kinds of tiny shells☆59Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated last year
- Creation of a laboratory for malware analysis in AWS☆84Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- God Mode Detection Rules☆130Updated last month
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆51Updated last month
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆40Updated 4 months ago
- Collection of links on bad opsec☆81Updated 3 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆121Updated 3 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆28Updated last year
- Real Android malware apps discussed in the book☆34Updated 11 months ago
- Traps web spiders☆65Updated 4 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆43Updated 9 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆18Updated last week
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- Reads and prints information from the website MalAPI.io☆38Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆115Updated 2 months ago
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆164Updated 2 weeks ago
- Public repository containing materials for various malware-related streams.☆22Updated 3 months ago
- Rules shared by the community from 100 Days of YARA 2024☆75Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 4 months ago
- Malware vulnerability intel tool for third-party attackers.☆107Updated last year