DefconParrot / DefconArsenalToolsLinks
A curation of tools presented at DEF CON conference each year, the world's largest hacker con.
☆33Updated last year
Alternatives and similar repositories for DefconArsenalTools
Users that are interested in DefconArsenalTools are comparing it to the libraries listed below
Sorting:
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 3 months ago
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A list of awesome penetration testing tools and resources.☆81Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆42Updated 2 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- ☆39Updated 5 months ago
- ☆25Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆64Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆151Updated 2 months ago
- DEFCON 31 slide deck and video link☆61Updated 11 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Mind Maps for penetration testing☆20Updated 4 years ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- A repository with informtion related to Cloud Osint☆105Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- List of Command&Control (C2) software☆40Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Updated 9 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year