mubix / howtowinccdc
Notes, Slides, Comments and Commands on How to Win CCDC
☆125Updated 4 months ago
Related projects: ⓘ
- CCDC: A collaboration between schools to share CCDC knowledge☆45Updated 7 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆119Updated last week
- Scripts and resources for Red Teaming at CCDC competitions☆97Updated 2 years ago
- Resolvn Threat Hunting Virtual Machine☆135Updated 5 years ago
- This contains the public CCDC materials for Cyber@UCR.☆34Updated 9 months ago
- ☆195Updated 2 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Updated 6 years ago
- Lewis & Clark CCDC Team Resources☆15Updated 9 years ago
- Scripts used in our HackWest Pros vs Joes event☆14Updated 6 years ago
- ☆20Updated this week
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last month
- ☆44Updated this week
- ☆53Updated this week
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- This is a logon script used to detect the theft of credentials by tools such as Mimikatz☆116Updated 9 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆122Updated 5 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆30Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆322Updated 2 months ago
- ☆73Updated 6 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- ☆54Updated 4 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆391Updated 6 months ago
- Get your APT on using social media as a tool for data exfiltration.☆143Updated last year
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆123Updated last year
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆52Updated 3 years ago
- Professionally Evil Web Application Penetration Testing 101☆138Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆254Updated 3 years ago
- ☆70Updated this week