ucrcyber / CCDCLinks
This contains the public CCDC materials for Cyber@UCR.
☆35Updated last year
Alternatives and similar repositories for CCDC
Users that are interested in CCDC are comparing it to the libraries listed below
Sorting:
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆128Updated this week
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 9 months ago
- Defensive Origins Training Schedule☆38Updated last year
- Scripts and resources for Red Teaming at CCDC competitions☆102Updated 2 years ago
- ☆15Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 4 years ago
- All my slides for any talks☆23Updated 7 months ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆134Updated 2 months ago
- Python API for interacting with sigma rules.☆55Updated 2 years ago
- ☆54Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆30Updated 8 years ago
- ☆77Updated 5 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Random notes collected on the intertubes relating to DFIR☆34Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- My Jupyter Notebooks☆36Updated 2 months ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Passive internal reconnaissance tool☆70Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- ☆27Updated 4 years ago
- Simple parser to get useful information from AWS S3 logs☆26Updated 3 years ago
- Valhalla API Client☆70Updated 2 years ago