AngusRed / DEF-CON-LinksLinks
Easy links and guides for DEF CON 28 and 29
☆57Updated 3 years ago
Alternatives and similar repositories for DEF-CON-Links
Users that are interested in DEF-CON-Links are comparing it to the libraries listed below
Sorting:
- All my slides for any talks☆23Updated 8 months ago
- Web application to create indexes for GIAC certification examinations.☆143Updated 2 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 10 months ago
- ☆54Updated 4 years ago
- ☆20Updated 5 years ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 6 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Purple Team Security☆75Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- ☆23Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Defensive Origins Training Schedule☆38Updated last year
- ☆76Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Some bash to make life easier after a new kali install..☆31Updated 2 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago