jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- UFSIT scripts and tools for hardening and auditing☆14Updated 4 months ago
- General purpose attack-defense range for zero-config deployment☆37Updated 7 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- Deny list generator for password filters☆25Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 7 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Canary Detection☆187Updated 4 months ago
- Lena's repo of Malware Monsters aka Malmons.☆44Updated 3 weeks ago
- ☆49Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆34Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- A repository of credential stealer formats☆227Updated 4 months ago
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 8 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆86Updated 3 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated 5 months ago
- ☆25Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- God Mode Detection Rules☆134Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆127Updated last month
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- ☆106Updated 3 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆28Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆51Updated last year
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆101Updated 2 months ago