Easy links and guides for DEF CON 28 and 29
☆57Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for DEF-CON-Links
Users that are interested in DEF-CON-Links are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Python tool build around GreyNoise's alpha/public API☆11Dec 20, 2018Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Guide for setting up the guardian node for the guardian testnet☆15Jul 8, 2020Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- CyLR - Live Response Collection Tool☆10Jul 14, 2020Updated 5 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 7 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆29Nov 13, 2020Updated 5 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 2 months ago
- Common Continuous Integration Team Scenarios: Text Version☆11Aug 9, 2020Updated 5 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- ☆36Aug 7, 2021Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago