Ajediday / Dormant_Cyber_PathogensLinks
How to create stickers and files for creating stickers
☆32Updated last year
Alternatives and similar repositories for Dormant_Cyber_Pathogens
Users that are interested in Dormant_Cyber_Pathogens are comparing it to the libraries listed below
Sorting:
- Duct Tape Command and Control!☆96Updated last month
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- ☆32Updated 10 years ago
- Wiegotcha: Long Range RFID Thief☆234Updated 3 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆88Updated 7 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- ☆105Updated 6 years ago
- Web Sight Docker Deployment☆122Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Modifies your DEFCON27 Badge into a Jackp0t badge that will complete other attendee's badge challenge/trigger rick roll when held within …☆35Updated 6 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Transparent network tap☆119Updated 9 years ago
- ☆208Updated 7 years ago
- Stargate☆95Updated 9 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 3 weeks ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- A NodeMCU based wifi scanner that logs SSIDs to a text file on a sd card.☆21Updated 6 years ago
- How I hacked mine..☆21Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 8 years ago
- DEF CON Hacker Tracker☆108Updated 3 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Common Findings Database☆101Updated 6 years ago
- Big Iron Recon & Pwnage☆127Updated 3 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 5 years ago
- ☆27Updated 9 years ago
- Umbrella project for various ESP8266 programs☆15Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Bash script to install Honeypot projects ona Raspbian System☆28Updated 10 years ago