ChrisJohnRiley / Random_CodeLinks
Random Code, POC Scripts and other things (Your Mileage May Vary)
☆89Updated 6 years ago
Alternatives and similar repositories for Random_Code
Users that are interested in Random_Code are comparing it to the libraries listed below
Sorting:
- Stargate☆95Updated 9 years ago
- Web Sight Docker Deployment☆122Updated 7 years ago
- Duct Tape Command and Control!☆96Updated 2 months ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆44Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- ☆145Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated last month
- ☆92Updated 7 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- Common Findings Database☆102Updated 6 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- An opensource project similar to HoneyDocs☆26Updated 9 years ago
- Distributed wrapper around oclHashcat☆91Updated 6 months ago
- Collection of metasploit modules☆69Updated 8 years ago
- Repo for autosnort scripts.☆157Updated 4 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- for the louise☆244Updated 5 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago