AngusRed / DEF-CON-Links
Easy links and guides for DEF CON 28 and 29
☆57Updated 3 years ago
Alternatives and similar repositories for DEF-CON-Links:
Users that are interested in DEF-CON-Links are comparing it to the libraries listed below
- All my slides for any talks☆23Updated last month
- ☆54Updated 4 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- ☆19Updated 5 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 3 months ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated last year
- Learn you a book for some infosec good☆62Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆16Updated 5 years ago
- Some bash to make life easier after a new kali install..☆29Updated last year
- Defensive Origins Training Schedule☆37Updated 11 months ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆98Updated 6 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago
- an awesome list of active defense resources☆113Updated 4 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Just a collection of pentest stuffs☆96Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆55Updated 3 years ago
- ☆23Updated 4 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 2 years ago