jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- UFSIT scripts and tools for hardening and auditing☆14Updated 5 months ago
- General purpose attack-defense range for zero-config deployment☆38Updated this week
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- God Mode Detection Rules☆134Updated last year
- Deny list generator for password filters☆26Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Updated 2 years ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆107Updated this week
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- ☆49Updated 9 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 3 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆192Updated 9 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- ☆63Updated 2 years ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 2 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆54Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆35Updated last year
- Canary Detection☆188Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- A repository of credential stealer formats☆233Updated 5 months ago
- Jupyter Notebooks for the Blue Team☆39Updated 10 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆94Updated 3 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆114Updated 3 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆138Updated last year