mike-bailey / CCDC-Scripts
Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourcing and because I may bring them to college.
☆30Updated 8 years ago
Alternatives and similar repositories for CCDC-Scripts:
Users that are interested in CCDC-Scripts are comparing it to the libraries listed below
- Scripts and resources for Red Teaming at CCDC competitions☆99Updated 2 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- Scoring Engine for Red/White/Blue Team Competitions☆126Updated 3 weeks ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆132Updated 2 months ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- CCDC Red Team PWNboard☆77Updated 7 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 7 months ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 3 years ago
- ☆168Updated 5 years ago
- ☆73Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- 504 VSAgent☆23Updated 7 years ago
- Automated, Collection, and Enrichment Platform☆324Updated 5 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 6 years ago
- Updated version of C2K☆50Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Day long class on packet analysis☆9Updated 5 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- Some PowerShell Defensive Scripts☆127Updated 8 years ago