jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- General purpose attack-defense range for zero-config deployment☆31Updated 6 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 3 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last week
- A repository of credential stealer formats☆224Updated 2 months ago
- Deny list generator for password filters☆25Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆27Updated 11 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆48Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated 2 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated 4 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Canary Detection☆187Updated 3 months ago
- God Mode Detection Rules☆134Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆88Updated 2 weeks ago
- Lena's repo of Malware Monsters aka Malmons.☆43Updated last month
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 4 months ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Updated 5 months ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆34Updated last year
- king of the hill cybersecurity competition☆31Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆130Updated this week
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 3 months ago
- Public repository containing materials for various malware-related streams.☆36Updated last month