jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- General purpose attack-defense range for zero-config deployment☆35Updated 6 months ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 3 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- God Mode Detection Rules☆134Updated last year
- Deny list generator for password filters☆25Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last month
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 4 months ago
- A repository of credential stealer formats☆226Updated 3 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆54Updated 5 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆27Updated last year
- Canary Detection☆187Updated 4 months ago
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 7 months ago
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Lena's repo of Malware Monsters aka Malmons.☆43Updated last month
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆85Updated 3 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆62Updated 11 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆90Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated 4 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago