All Projects → luisrodrigues154 → Cyber-Security

luisrodrigues154 / Cyber-Security

Licence: other
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.

Programming Languages

shell
77523 projects
c
50402 projects - #5 most used programming language
python
139335 projects - #7 most used programming language
SCSS
7915 projects
hack
652 projects
CSS
56736 projects

Projects that are alternatives of or similar to Cyber-Security

tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-14.29%)
Mutual labels:  cybersecurity, infosec
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+102.38%)
Mutual labels:  cybersecurity, infosec
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-21.43%)
Mutual labels:  cybersecurity, infosec
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+42.86%)
Mutual labels:  cybersecurity, infosec
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+264.29%)
Mutual labels:  cybersecurity, infosec
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+45.24%)
Mutual labels:  cybersecurity, infosec
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+2040.48%)
Mutual labels:  cybersecurity, infosec
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-9.52%)
Mutual labels:  cybersecurity, infosec
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+78.57%)
Mutual labels:  cybersecurity, infosec
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+88.1%)
Mutual labels:  cybersecurity, infosec
FSEC-VM
Backend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-54.76%)
Mutual labels:  cybersecurity, infosec
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+66.67%)
Mutual labels:  cybersecurity, infosec
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+604.76%)
Mutual labels:  cybersecurity, infosec
qvm-create-windows-qube
Spin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+535.71%)
Mutual labels:  cybersecurity, infosec
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+1738.1%)
Mutual labels:  cybersecurity, infosec
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+409.52%)
Mutual labels:  cybersecurity, infosec
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+309.52%)
Mutual labels:  cybersecurity, infosec
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+88.1%)
Mutual labels:  cybersecurity, infosec
SuperLibrary
Information Security Library
Stars: ✭ 60 (+42.86%)
Mutual labels:  cybersecurity, infosec
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+583.33%)
Mutual labels:  cybersecurity, infosec

Cyber security challenges

What is the content of this repository?

In this repository you can find solved (or on going) cyber security related challenges from multiple of the available platforms (HackTheBox, TryHackMe, etc). The main purpose is that it may help other people getting through a difficulty or to simply view things from other prespective!

Note: Just as a footnote, it is very noticeable the quality increase of the writeups during the whole process. With this being said, in each section, the bottom writeups are usually more recent and thus their quality is greater


pwn.college

Name Link (notes) Category Progress
babysuid Program misuse 19/100
babyshell Shellcode writing 7/14

Embedded Security CTF

Name Link (notes) Progres
New Orleans Solved
Sydney Solved
Hanoi Solved
Cusco Solved
Reykjavik Solved
Johannesburg Solved
Whitehorse Solved
Montevideo Solved
Santa Cruz Solved

HackTheBox


Machines

Name Link (notes) Progress
Academy Solved
Admirer Solved
Blunder Solved
Bucket Solved
Buff Solved
Delivery Solved
Doctor Solved
Jewel Solved
Laboratory Solved
Luanne Solved
OpenKeyS Solved
Passage Solved
Ready Solved
ScriptKiddie Solved
SneakyMailer Solved
Tabby Solved
Time Solved
Tenet Solved
Ophiuchi Solved
Spectra Solved
The Notebook Solved
Schooled Solved
Armageddon Solved
Tentacle Solved
Unobtainium Solved
Knife Solved
Pit Solved
Love Solved

Challenges

Name Link (notes) Category Progress
Invitation NA Solved
0xDiablos Pwn Solved
Format Pwn Solved
Space Pwn Solved
Hunting Pwn Solved
BabyRE Reverse Engineering Solved
Bypass Reverse Engineering Solved
Exatlon Reverse Engineering Solved
ImpossiblePassword Reverse Engineering Solved
HackyBird Reverse Engineering Solved
Restaurant Pwn Solved
Bad Grades Pwn Solved
Cat Mobile Solved
Cryptohorrific Mobile Solved
DebugMe Reverse Engineering Solved

Academy

Name Link (notes) Progress
Windows Fundamentals Solved

TryHackMe

Name Link (notes) Progress
AgentSudo Solved
BasicPentesting Solved
BoilerCTF Solved
BountyHacker Solved
Ignite Solved
LinuxPrivEsc Solved
Metasploit Solved
MrRobotCTF Solved
PickleRick Solved
PostExploitationBasics On Going
RootMe Solved
Tartarus Solved
TheFindCommand Solved
VulnUniversity Solved
IntroTo x86-64 Solved
Reverse Engineering Solved
Classic Passwd Solved
Lazy Admin Solved
Wonderland Solved
REloaded Solved
Anonymous Solved
DogCat Solved
Blueprint Solved
VulnNet Solved
VulnNet: Node Solved
VulnNet: dotpy Solved
VulnNet: dotjar Solved

UnderTheWire

Name Link (notes) Progress
Century Solved
Cyborg Solved

CyberDefenders

Name Link (notes) Progress
EscapeRoom_PacketAnalysis Solved (1 missing)

OWASP - Juice-shop

Level Link (notes) Progress
Level 1 Solved
Level 2 Solved
Level 3 Solved
Level 4 On Going

Exploit Education

Nebula

Name Link (notes) Progress
Level 00 Solved
Level 01 Solved
Level 02 Solved
Level 03 Solved
Level 04 Solved
Level 05 Solved
Level 06 Solved
Level 07 Solved
Level 08 Solved
Level 09 Solved
Level 10 Solved
Level 11 Solved
Level 12 Solved
Level 13 Solved
Level 14 Solved
Level 15 Solved
Level 16 Solved
Level 17 Solved
Level 19 Solved

Blue Team Labs

Name Link (notes) Category Progress
Phishing Analysis Security Operations Solved
ILOVEYOU Reverse Engineering Solved
Network Analysis - Web Shell Security Operations Solved
Reverse Engineering - A Classic Injection Reverse Engineering Solved
Log Analysis - Privilege Escalation Ctf-like Solved
Malicious PowerShell Analysis Security Operations Solved
Browser Forensics - Cryptominer Incident Response Solved
The Planet's Prestige Ctf-like Solved
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].