jselliott / USCyberOpen2023
Challenges created for the US Cyber Open 2023 (Season 3)
☆11Updated last year
Alternatives and similar repositories for USCyberOpen2023:
Users that are interested in USCyberOpen2023 are comparing it to the libraries listed below
- Challenges and writeups for the US Cyber Open for 2024☆18Updated 8 months ago
- General purpose attack-defense range for zero-config deployment☆20Updated 3 months ago
- UFSIT scripts and tools for hardening and auditing☆13Updated this week
- Deny list generator for password filters☆25Updated 6 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆137Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆62Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated last month
- ☆40Updated 5 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆31Updated 11 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆28Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 9 months ago
- God Mode Detection Rules☆134Updated 6 months ago
- Jupyter Notebooks for the Blue Team☆34Updated last month
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 5 months ago
- Breizh CTF 2024 - Challenges☆13Updated 8 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 6 months ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆26Updated 10 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆70Updated last month
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 4 months ago
- create a "simulated internet" cyber range environment☆15Updated 2 weeks ago