Easy links and guides for DEF CON 28 and 29
☆57Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for DEF-CON-Links
Users that are interested in DEF-CON-Links are comparing it to the libraries listed below
Sorting:
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- ☆36Aug 7, 2021Updated 4 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58May 25, 2020Updated 5 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- ☆15Aug 7, 2021Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆21Jun 14, 2021Updated 4 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- ☆16Sep 20, 2023Updated 2 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- Hack. Sleep. Repeat☆22Oct 17, 2023Updated 2 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- ☆27Feb 3, 2026Updated 3 weeks ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 4 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Jan 16, 2024Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year