ucrcyber / CCDC
This contains the public CCDC materials for Cyber@UCR.
☆35Updated last year
Alternatives and similar repositories for CCDC
Users that are interested in CCDC are comparing it to the libraries listed below
Sorting:
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- All my slides for any talks☆23Updated 7 months ago
- Scripts and resources for Red Teaming at CCDC competitions☆102Updated 2 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆134Updated last month
- ☆54Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 8 months ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Statically Compiled Tools that could be used in engagements☆17Updated 2 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆128Updated this week
- Passive internal reconnaissance tool☆70Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 3 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- ☆15Updated 6 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- ☆77Updated 5 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 5 years ago
- Hunt malware with Volatility☆47Updated last year
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆21Updated last year
- Some bash to make life easier after a new kali install..☆30Updated 2 years ago
- ☆52Updated 6 years ago
- ☆169Updated 5 years ago