Challenges for the DoD Cyber Challenge C1 CTF
☆16May 3, 2024Updated last year
Alternatives and similar repositories for DoD-CyberChallenge-C1-Challenges
Users that are interested in DoD-CyberChallenge-C1-Challenges are comparing it to the libraries listed below
Sorting:
- Challenges that I made for the DoD Cyber Sentinel Challenge of 2024☆22May 19, 2024Updated last year
- A script to download all the challenges and files from the CTFd instance.☆62Jun 14, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated last year
- A task management bot for teams using Discord. Be it at school, work or anywhere else, Ivone keeps you organized.☆10Aug 28, 2021Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- These are my personal notes for everything I learned regarding hacking APIs. Enjoy.☆21Mar 4, 2024Updated 2 years ago
- dcsync bof☆46Feb 13, 2026Updated last month
- ☆17Jan 20, 2026Updated 2 months ago
- ☆18Jun 25, 2024Updated last year
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- ☆113Updated this week
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆42Mar 12, 2026Updated last week
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆27Feb 1, 2026Updated last month
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆29Jun 18, 2025Updated 9 months ago
- Windows Privilege Escalation Tool☆19Dec 30, 2025Updated 2 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆122Mar 13, 2026Updated last week
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- ☆24Feb 18, 2025Updated last year
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated last year
- A lightweight Windows Prefetch file parser to extract programs' execution history☆68Jan 12, 2026Updated 2 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Oct 8, 2023Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Mar 13, 2024Updated 2 years ago
- All-in-one Scoring Engine☆30Mar 2, 2026Updated 2 weeks ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆66Apr 13, 2024Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 2 months ago