Easy links and guides for DEF CON 28 and 29
☆57Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for DEF-CON-Links
Users that are interested in DEF-CON-Links are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of slides for security presentations I've given in various forums☆14Mar 21, 2026Updated 3 weeks ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 9 months ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 9 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- ☆19Aug 6, 2021Updated 4 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 6 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- A quad USB-to-serial breakout board based on the FT4232 IC☆15Aug 5, 2018Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆29Nov 13, 2020Updated 5 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 3 months ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Preventing malicious takeover of the retired slurp AWS tool☆41Aug 27, 2018Updated 7 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Linux Device Drivers 3 examples updated to work in recent kernels☆25May 6, 2012Updated 13 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 6 months ago
- ☆15Aug 7, 2021Updated 4 years ago
- Hack. Sleep. Repeat☆22Oct 17, 2023Updated 2 years ago