uwacyber / cits3006Links
☆11Updated last week
Alternatives and similar repositories for cits3006
Users that are interested in cits3006 are comparing it to the libraries listed below
Sorting:
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆45Updated 2 years ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆367Updated 2 months ago
- Open Threat Hunting Framework☆120Updated 2 years ago
- This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach i…☆88Updated 3 years ago
- Learn Binary Exploitation with sample problems and solutions☆158Updated 2 years ago
- Run several volatility plugins at the same time☆115Updated 2 years ago
- Different learning materials☆228Updated last month
- Jupyter Notebooks for the Blue Team☆146Updated 7 months ago
- Malware Analysis Tools☆30Updated 5 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆202Updated this week
- Challenges and writeups for PatriotCTF 2023☆24Updated 2 years ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆34Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Practice Labs☆100Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Updated last year
- ☆199Updated 9 months ago
- Collection of writeups on ICS/SCADA security.☆185Updated last month
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated last month
- ☆116Updated 2 years ago
- Some of my Malware Analysis writeups☆48Updated 2 weeks ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆131Updated 4 months ago
- Official writeups for Hack The Boo CTF 2023☆45Updated 10 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆157Updated 10 months ago
- Cybersecurity Notes☆166Updated last year
- All the deals for InfoSec related software/tools this Black Friday☆89Updated last year
- My personal OT resource list, gather throughout research and internet adventure.☆113Updated this week
- Code repository for "Machine Learning For Red Team Hackers".☆40Updated 5 years ago