jselliott / USCyberOpen2023
Challenges created for the US Cyber Open 2023 (Season 3)
☆11Updated last year
Alternatives and similar repositories for USCyberOpen2023:
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
- Challenges and writeups for the US Cyber Open for 2024☆17Updated 7 months ago
- General purpose attack-defense range for zero-config deployment☆17Updated 2 months ago
- UFSIT scripts and tools for hardening and auditing☆11Updated 3 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆44Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 3 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆74Updated 2 years ago
- ☆65Updated last month
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆45Updated 2 months ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆11Updated last year
- Deny list generator for password filters☆25Updated 5 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆45Updated 9 months ago
- Free training course offered at Hack Space Con 2023☆136Updated last year
- DSU DefSec Scripts to help automatically secure machines☆9Updated 9 months ago
- ☆32Updated last month
- Graphical map of known Advanced Persistent Threats☆47Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- God Mode Detection Rules☆133Updated 5 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆64Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 7 months ago
- Rules shared by the community from 100 Days of YARA 2024☆83Updated 2 weeks ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆47Updated 3 months ago
- Creation of a laboratory for malware analysis in AWS☆90Updated 2 years ago
- Canary Detection☆163Updated 9 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 3 months ago
- A repository of credential stealer formats☆129Updated this week
- All kinds of tiny shells☆58Updated last year
- ☆40Updated 4 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆49Updated last year
- Collection of steganography tools for images and text☆36Updated last year