A curation of tools presented at DEF CON conference each year, the world's largest hacker con.
☆45Sep 8, 2025Updated 7 months ago
Alternatives and similar repositories for DefconArsenalTools
Users that are interested in DefconArsenalTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Quick iOS Backup UnFunkerizor☆22May 25, 2021Updated 4 years ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 5 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 8 months ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆23May 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a collection of wordlist for different projects☆13Oct 12, 2024Updated last year
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I …☆32Jul 13, 2023Updated 2 years ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- ☆18Mar 24, 2026Updated 3 weeks ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 7 months ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆13Mar 9, 2023Updated 3 years ago
- From Dork to Download: Automating Google Dorks with Playwright☆43Mar 1, 2026Updated last month
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 3 months ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Continuous NFC field to light LED equipped implants and tags☆23Sep 11, 2024Updated last year
- ☆12Aug 16, 2024Updated last year
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Updated this week
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated last month
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 8 months ago
- Start your journey with Bug Bounty.☆15Oct 12, 2022Updated 3 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆18Oct 25, 2025Updated 5 months ago