BeezleLabs / HackerTracker-iOS
HackerTracker for iOS using Swift
☆36Updated 2 years ago
Alternatives and similar repositories for HackerTracker-iOS:
Users that are interested in HackerTracker-iOS are comparing it to the libraries listed below
- DEF CON Hacker Tracker☆106Updated 2 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- crack text files encrypted with vim's :X command☆22Updated 8 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- How to create stickers and files for creating stickers☆32Updated last year
- DefCon 26 Badge Hacking☆38Updated 6 years ago
- ☆31Updated 4 years ago
- Capture The Flag Information☆12Updated 6 years ago
- Scoring Engine for CTF competitions☆46Updated last year
- ☆55Updated 4 years ago
- DefCon Hardware Hacking Village Learn To Solder Kit☆39Updated 9 years ago
- defcon 27 badge☆25Updated 5 years ago
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆47Updated 9 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- 🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.☆43Updated 5 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆32Updated 2 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago