nsacyber / Cyber-Challenge
Supporting files for cyber challenge exercises. #nsacyber
☆44Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cyber-Challenge
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆35Updated 11 years ago
- THP Forensic Challenges☆19Updated last year
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆41Updated 3 years ago
- SANS Holiday Hack Challenge 2020☆13Updated 3 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆55Updated 2 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆72Updated 7 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆21Updated 4 years ago
- Convert Wigle.net result from json to Kml☆15Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 3 years ago
- ☆21Updated last year
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆26Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- Maltego transform for visualizing Nessus scan data☆45Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆49Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Defensive Origins Training Schedule☆36Updated 11 months ago
- Various components we use in labs☆10Updated 4 years ago
- ☆29Updated 6 years ago
- Some bash to make life easier after a new kali install..☆29Updated last year
- Penetration Testing/Security Cheatsheets☆56Updated 9 years ago
- GreyNoise Maltego integration and transforms☆20Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- ☆40Updated 3 years ago
- ☆11Updated 3 years ago