malware-unicorn / BeatSaberCTFChallenge
Created a CTF challenge based on Beat Saber
☆40Updated 5 years ago
Alternatives and similar repositories for BeatSaberCTFChallenge:
Users that are interested in BeatSaberCTFChallenge are comparing it to the libraries listed below
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- ☆17Updated 5 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 5 years ago
- Red Team Resources☆59Updated 6 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- ☆97Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆80Updated 6 months ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆28Updated 5 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- ☆76Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- A friendly Toolkit for Beginner CTF players☆40Updated 2 months ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- ☆122Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago