m4lwhere / DoD-CyberChallenge-C1-ChallengesView external linksLinks
Challenges for the DoD Cyber Challenge C1 CTF
☆16May 3, 2024Updated last year
Alternatives and similar repositories for DoD-CyberChallenge-C1-Challenges
Users that are interested in DoD-CyberChallenge-C1-Challenges are comparing it to the libraries listed below
Sorting:
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 10 months ago
- ☆14Jan 20, 2026Updated 3 weeks ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 8 months ago
- ☆18Jun 25, 2024Updated last year
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 6 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- ☆29Jun 18, 2025Updated 7 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Oct 8, 2023Updated 2 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆24Feb 18, 2025Updated 11 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Mar 13, 2024Updated last year
- A lightweight Windows Prefetch file parser to extract programs' execution history☆63Jan 12, 2026Updated last month
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆121Feb 6, 2026Updated last week
- how to get a few pwn points if you don't know how to pwn☆29Jul 6, 2019Updated 6 years ago
- ☆70Dec 26, 2025Updated last month
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- DShield Sensor Log Collection with ELK☆44Feb 4, 2026Updated last week
- Tools and Resources for Physical Security Red Teaming☆46Nov 14, 2025Updated 3 months ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- ☆49Nov 21, 2024Updated last year
- Simple Python script that will set up a PHP server for stealing cookies - and provided the payload needed.☆39Jan 28, 2025Updated last year
- ☆45Dec 23, 2024Updated last year
- Simple skeleton for a CPP DLL☆66Jan 11, 2020Updated 6 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Oct 11, 2025Updated 4 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated last month
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆75Oct 27, 2025Updated 3 months ago
- useful stuff for pentesting☆49Mar 18, 2025Updated 10 months ago
- Most Responder's configuration power in your hand.☆53Jan 19, 2025Updated last year