jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- UFSIT scripts and tools for hardening and auditing☆14Updated 7 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- General purpose attack-defense range for zero-config deployment☆39Updated last month
- God Mode Detection Rules☆134Updated last year
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 3 months ago
- ☆49Updated 10 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Updated last year
- A repository of credential stealer formats☆236Updated 6 months ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Deny list generator for password filters☆26Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Canary Detection☆186Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Knowledge base on cybercriminal concealment techniques☆89Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 7 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated 3 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆131Updated 4 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆108Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆52Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- A YARA & Malware Analysis Toolkit written in Rust.☆86Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- ☆101Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 6 months ago