jselliott / USCyberOpen2023Links
Challenges created for the US Cyber Open 2023 (Season 3)
☆13Updated 2 years ago
Alternatives and similar repositories for USCyberOpen2023
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
Sorting:
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- General purpose attack-defense range for zero-config deployment☆41Updated 2 months ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 7 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆105Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- God Mode Detection Rules☆135Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 4 months ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Updated last year
- Rebuild of portspoof in GO with additional features.☆28Updated 2 months ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 2 months ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Updated 10 months ago
- Canary Detection☆186Updated 3 months ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- A repository of credential stealer formats☆238Updated 7 months ago
- Graphical map of known Advanced Persistent Threats☆61Updated 9 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆133Updated 5 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- ☆49Updated 11 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 5 months ago
- An automated security testing platform that uses Large Language Models (LLMs) to autonomously solve CTF challenges and penetration testin…☆191Updated last week
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆66Updated 9 months ago