Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

120 total results found

PDF to Hashcat

National Cyber League Scripts

#!/usr/bin/env python # Copyright (c) 2013 Shane Quigley, < shane at softwareontheside.info > # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in ...

PDF to John

National Cyber League Scripts

#!/usr/bin/env python3 # This software is Copyright (c) 2023 Benjamin Dornel <[email protected]> # and it is hereby released to the general public under the following terms: # Redistribution and use in source and binary forms, with or without # modific...

Steg

National Cyber League Scripts

#!/usr/bin/env python3 """ Steganography Extraction Tool This script extracts hidden data from images using various steganography techniques. Usage: python steg_extract.py <image_file> """ import sys import os import numpy as np from PIL import Image import ...

Binary Log Parser and Anomaly Detector

National Cyber League Scripts

#!/usr/bin/env python3 """ Binary Log Parser and Anomaly Detector This script parses a custom binary format for login attempt logs and identifies potentially compromised accounts based on anomalous behavior. Format: - username_length: 4-byte integer (big-en...

Forensic Report

Forensic Report

Investigator Information David RizzoB.S. Cyber SecurityWilmington University, New Castle, DelawareDigital Forensic Examiner Case Details Subject: Digital Forensics Examination ReportOffence: Illegal purchase, sale, or trade of owlsAccused: Sarah McAvoyD...

Elastic Stack Deployment

ELK Stack

The files in this repository were used to configure the network depicted below. These files have been tested and used to generate a live ELK deployment on Azure. They can be used to either recreate the entire deployment pictured above. Alternatively, select...

FileBeat Config

ELK Stack YAML

######################## Filebeat Configuration ############################ # This file is a full configuration example documenting all non-deprecated # options in comments. For a shorter configuration example, that contains only # the most common options, pl...

FileBeat

ELK Stack YAML

GNU nano 4.8 filebeat.yml --- - name: Installing and Launching Filebeat hosts: webservers become: yes tasks: - name: Download filebeat deb command: curl -L -O https://artifacts.e...

Docker Install

ELK Stack YAML

--- - name: InstallDVWA hosts: webservers become: true tasks: - name: Uninstall apache httpd apt: name: apache2 state: absent - name: docker.io apt: update_cache: yes name: docker.io state: present - na...

ELK Install

ELK Stack YAML

--- - hosts: elk become: true tasks: - name: Set vm.max_map_count to 262144 ansible.posix.sysctl: name: vm.max_map_count value: 262144 state: present reload: yes - name: docker.io ...

MetricBeat Config

ELK Stack YAML

###################### Metricbeat Configuration Example ####################### # This file is an example configuration file highlighting only the most common # options. The metricbeat.reference.yml file from the same directory contains all the # supported op...

MetricBeat

ELK Stack YAML

GNU nano 4.8 metricbeat.yml --- - name: Install metric beat hosts: webservers become: true tasks: - name: Download metricbeat command: curl -L -O https://artifacts.elastic.co/d...

Ansible Config

ELK Stack Ansible

# config file for ansible -- https://ansible.com/ # =============================================== # nearly all parameters can be overridden in ansible-playbook # or with command line flags. ansible will read ANSIBLE_CONFIG, # ansible.cfg in the current work...

Hosts

ELK Stack Ansible

# This is the default ansible 'hosts' file. # # It should live in /etc/ansible/hosts # # - Comments begin with the '#' character # - Blank lines are ignored # - Groups of hosts are delimited by [header] elements # - You can enter hostnames or ip addres...

Project Write Up

Red Team Blue Team

RedTeam vs. BlueTeam Devices Kali Capstone Elk Set Up Beats Need to set up beats in order to log the attacks. Steps to set up: Log into Capstone vagrant:tnargav sudo su filebeat modules enable apache filebeat setup metricbeat mod...

The Important of the Scope of Engagement

Red Team Blue Team

Penetration testing is a critical part of securing businesses; however, without limitations, it can be very damaging to an organization. The scope of engagement provides a concrete definition of what the penetration tester is allowed to do. Without that list, ...

Notes

Red Team Blue Team

Setting up Beats on Capstone This is done for logging that attacks before attacking Log into capstone - Vagrant:tnargav Sudo su Filebeat modules enable apace Filebeat setup Metricbeat modules enable apache Metricbeat setup Packetbeat setup Systemctl restar...

Symmetric Encryption

Security Engineer Intro to Cryptography

Overview Symmetric encryption, or secret-key encryption, is a fundamental cryptographic method where the same key (the secret key) is used for both encryption (converting plaintext to ciphertext) and decryption (recovering the plaintext from the ciphertext). T...