[★☆☆] ConnectionChecker - Lies
|
Malware Analysis and Reverse Engineering |
3 |
|
[★☆☆] ConnectionChecker - Tool
|
Malware Analysis and Reverse Engineering |
3 |
|
[★★☆] Equestria - Door To The Stable
|
Web Exploitation and Binary Exploitation |
6 |
|
[★☆☆] Bastion - Clean bastion
|
Forensics |
3 |
|
[★★☆] Eugene’s FATigue - Was that the only file?
|
Forensics |
6 |
|
[★★☆] Eugene’s FATigue - FATigue
|
Forensics |
6 |
|
[★☆☆] Bastion - Inspect the file system
|
Forensics |
3 |
|
[★☆☆] Bastion - So much just from logs
|
Forensics |
3 |
|
[★☆☆] Adversary - Key exchange
|
Cryptography |
9 |
|
[★☆☆] Ransomware - Recovery 2
|
Cryptography |
3 |
|
[★☆☆] Ransomware - Recovery 1
|
Cryptography |
3 |
|
[☆☆☆] SanityChecker - Bash dropper
|
Malware Analysis and Reverse Engineering |
1 |
|
[☆☆☆] SanityChecker - Sleepy python
|
Malware Analysis and Reverse Engineering |
1 |
|
[★☆☆] Adversary - 3AES
|
Cryptography |
3 |
|
[☆☆☆] Advanced Decryption Standard - easy like counting up to three
|
Cryptography |
1 |
|
[☆☆☆] Advanced Decryption Standard - Blockchain
|
Cryptography |
1 |
|
[☆☆☆] Advanced Decryption Standard - Codebook
|
Cryptography |
1 |
|
[★★★] Suspect tracking - Localization
|
OSINT |
9 |
|
[★★★] Suspect tracking - Identification
|
OSINT |
9 |
|
[★☆☆] Adversary - Almost Classic
|
Cryptography |
3 |
|