Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

178 total results found

Scripts

National Cyber League

Binary Parser

National Cyber League Scripts

import struct import socket import datetime from collections import defaultdict, Counter def parse_binary_logs(file_path): """Parse binary log file according to the specified format.""" login_attempts = [] with open(file_path, 'rb') as f: ...

Compromised User Detector

National Cyber League Scripts

import struct import socket import datetime from collections import defaultdict, Counter def parse_binary_logs(file_path): """Parse binary log file according to the specified format.""" login_attempts = [] with open(file_path, 'rb') as f: ...

GPG Verify

National Cyber League Scripts

#!/bin/bash echo "Verifying signature files in the current directory..." for sig_file in *.sig; do if [[ -f "$sig_file" ]]; then original_file="${sig_file%.sig}" echo "" echo "Verifying signature for \"$original_file\" using \"$sig_file\"..." ...

Hash Identifier

National Cyber League Scripts

#!/usr/bin/env python3 import re import sys import hashlib from collections import defaultdict def identify_hash(hash_string): """Identify the type of hash based on pattern, length, and character set.""" # Clean the hash string hash_string =...

HMAC

National Cyber League Scripts

#!/usr/bin/env python3 """ Simple HMAC Verification Script This script verifies HMAC signatures for message files by: 1. Finding all message_#.txt and message_#.hmac file pairs 2. Checking each line to verify the HMAC integrity 3. Reporting only basic verific...

HMAC Integrity Checker

National Cyber League Scripts

#!/usr/bin/env python3 """ DNS Subdomain Batch Integrity Checker This script processes multiple message/HMAC file pairs in a directory, following the pattern: message_#.txt and message_#.hmac It automatically detects and verifies all matching pairs in the sp...

Liber8tion Cracker

National Cyber League Scripts

#!/usr/bin/env python3 import os import argparse import subprocess import sys import tempfile import shutil def run_hashcat(cmd, description): """Run a hashcat command with proper logging""" print(f"[+] {description}") print(f"[+] Command: {' '.j...

PDF to Hashcat

National Cyber League Scripts

#!/usr/bin/env python # Copyright (c) 2013 Shane Quigley, < shane at softwareontheside.info > # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in ...

PDF to John

National Cyber League Scripts

#!/usr/bin/env python3 # This software is Copyright (c) 2023 Benjamin Dornel <[email protected]> # and it is hereby released to the general public under the following terms: # Redistribution and use in source and binary forms, with or without # modific...

Steg

National Cyber League Scripts

#!/usr/bin/env python3 """ Steganography Extraction Tool This script extracts hidden data from images using various steganography techniques. Usage: python steg_extract.py <image_file> """ import sys import os import numpy as np from PIL import Image import ...

Binary Log Parser and Anomaly Detector

National Cyber League Scripts

#!/usr/bin/env python3 """ Binary Log Parser and Anomaly Detector This script parses a custom binary format for login attempt logs and identifies potentially compromised accounts based on anomalous behavior. Format: - username_length: 4-byte integer (big-en...

Forensic Report

This book presents a complete Digital Forensics Examination Report documenting the investigation into a criminal case involving the illegal trade of owls (Subject: Sarah McAvoy). Authored by a Digital Forensic Examiner, this report serves as a detailed case st...

Forensic Report

Forensic Report

Investigator Information David RizzoB.S. Cyber SecurityWilmington University, New Castle, DelawareDigital Forensic Examiner Case Details Subject: Digital Forensics Examination ReportOffence: Illegal purchase, sale, or trade of owlsAccused: Sarah McAvoyD...

ELK Stack

Elastic Stack Deployment

ELK Stack

The files in this repository were used to configure the network depicted below. These files have been tested and used to generate a live ELK deployment on Azure. They can be used to either recreate the entire deployment pictured above. Alternatively, select...

YAML

ELK Stack

FileBeat Config

ELK Stack YAML

######################## Filebeat Configuration ############################ # This file is a full configuration example documenting all non-deprecated # options in comments. For a shorter configuration example, that contains only # the most common options, pl...