AngusRed / DEF-CON-Links
Easy links and guides for DEF CON 28 and 29
☆57Updated 3 years ago
Alternatives and similar repositories for DEF-CON-Links:
Users that are interested in DEF-CON-Links are comparing it to the libraries listed below
- All my slides for any talks☆23Updated 4 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆54Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 7 months ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- ☆20Updated 5 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- Purple Team Security☆74Updated 2 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- ☆23Updated 4 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- ☆30Updated 6 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- ☆77Updated 5 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago