jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
 - General purpose attack-defense range for zero-config deployment☆39Updated 8 months ago
 - UFSIT scripts and tools for hardening and auditing☆14Updated 5 months ago
 - Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Updated 2 years ago
 - Lena's repo of Malware Monsters aka Malmons.☆44Updated last month
 - ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 2 months ago
 - Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
 - Public repository containing materials for various malware-related streams.☆43Updated 2 weeks ago
 - Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
 - God Mode Detection Rules☆134Updated last year
 - A script to download all the challenges and files from the CTFd instance.☆59Updated 4 months ago
 - An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆140Updated last week
 - Canary Detection☆187Updated 2 weeks ago
 - How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
 - Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
 - Deny list generator for password filters☆25Updated last year
 - ☆49Updated 8 months ago
 - Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆70Updated last year
 - Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆113Updated 3 months ago
 - A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137Updated last year
 - A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
 - king of the hill cybersecurity competition☆32Updated 3 years ago
 - A repository of credential stealer formats☆229Updated 4 months ago
 - AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆143Updated 2 months ago
 - A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
 - SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆89Updated 4 months ago
 - LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 8 months ago
 - This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆104Updated 2 months ago
 - Repository that contains a set of purposefully erroneous Yara rules.☆59Updated 3 months ago
 - BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago