ChrisJohnRiley / Random_Code
Random Code, POC Scripts and other things (Your Mileage May Vary)
☆89Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Random_Code
- Stargate☆94Updated 8 years ago
- New firmware for the DEFCON 24 badge☆8Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 5 years ago
- ☆140Updated 8 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆50Updated 9 years ago
- ☆55Updated 4 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- ☆32Updated 10 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆55Updated 9 years ago
- Tampermonkey script to extract information from Meteor applications☆33Updated 8 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- ☆12Updated 8 years ago
- ☆25Updated 7 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆43Updated 9 years ago
- Easy 802.1Q VLAN Hopping☆79Updated 4 months ago
- Because I can't find scripts to do this anywhere else...☆25Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆114Updated 6 years ago
- 3D reproduction of TSA Master keys☆68Updated 2 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆78Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 5 months ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Transparent network tap☆116Updated 9 years ago