ucrcyber / CCDCLinks
This contains the public CCDC materials for Cyber@UCR.
☆38Updated 2 years ago
Alternatives and similar repositories for CCDC
Users that are interested in CCDC are comparing it to the libraries listed below
Sorting:
- ☆54Updated 5 years ago
- ☆167Updated 5 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated this week
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- All my slides for any talks☆23Updated last year
- Some bash to make life easier after a new kali install..☆34Updated 3 years ago
- Let's obscure some IPv4 addresses☆38Updated 3 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- Valhalla API Client☆70Updated 3 weeks ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- Protocol agnostic online password guessing API.☆85Updated 2 years ago
- ☆101Updated last year
- List of Repositories☆102Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆104Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 5 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆100Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 10 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆66Updated 4 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated 2 years ago
- Passive internal reconnaissance tool☆73Updated 3 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- Defensive Origins Training Schedule☆39Updated 2 years ago
- ☆69Updated 4 years ago
- A repo to support the book☆113Updated 4 years ago